Chapter 16. Introduction to Forensics

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Understand basic forensics principles.

Image Make a forensic copy of a drive.

Image Use basic forensics tools.

Introduction

Throughout this book we have explored network security. We have examined threats and countermeasures, firewalls, anti-virus, IDS, cyberterrorism, policies, and more. However, your network ...

Get Network Defense and Countermeasures: Principles and Practices, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.