Network intrusion analysis methodologies, tools, and techniques for incident analysis and response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investi...

Descripción completa

Detalles Bibliográficos
Otros Autores: Fichera, Joe, 1966- (-), Bolt, Steven
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam : Elsevier 2013.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628574506719
Descripción
Sumario:Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full ope
Notas:Description based upon print version of record.
Descripción Física:1 online resource (253 p.)
Bibliografía:Includes bibliographical references and index.
ISBN:9781283706704
9781597499712