Chapter 14. Investigating Network Traffic and Investigating Logs

Introduction

Networks are exposed to an unending series of attacks and exposures. External threats usually come from the Internet and can be grouped into three broad categories such as denial of service (DoS); using the victim’s network as a base of attack, to target other networks; or for threat or alteration of information. Internal ...

Get The Best Damn Cybercrime and Digital Forensics Book Period now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.