Appendix A. Implementing Cybercrime Detection Techniques on Windows and *nix
Topics we‘ll investigate in this Appendix:
- Security Auditing and Log Files
- Firewall Logs, Reports, Alarms, and Alerts
- Commercial Intrusion Detection Systems
- IP Spoofi ng and Other Antidetection Tactics
- Honeypots, Honeynets, and Other “Cyberstings”
- Summary
- Frequently Asked Questions
Introduction
Once an attack has occurred or a system or network has been compromised, it's essential to be able to sift through the evidence of what's happened. From a technical information ...
Get UNIX and Linux Forensic Analysis DVD Toolkit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.