Chapter 14. Investigating Network Traffic and Investigating Logs

Introduction

Networks are exposed to an unending series of attacks and exposures. External threats usually come from the Internet and can be grouped into three broad categories such as denial of service (DoS); using the victim’s network as a base of attack, to target other networks; or for threat or alteration of information. Internal ...

Get The Best Damn Cybercrime and Digital Forensics Book Period now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.