Free Downloads
Computer Forensics: Investigating Network Intrusions And Cyber Crime (EC-Council Press)

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Network Intrusions and Cybercrime includes a discussion of tools used in investigations as well as information on investigating network traffic, web attacks, DOS attacks, Corporate Espionage and much more!

Series: EC-Council Press

Paperback: 400 pages

Publisher: Cengage Learning; 1 edition (September 16, 2009)

Language: English

ISBN-10: 1435483529

ISBN-13: 978-1435483521

Product Dimensions: 10.7 x 8.4 x 1 inches

Shipping Weight: 2 pounds (View shipping rates and policies)

Average Customer Review: 4.4 out of 5 stars  See all reviews (5 customer reviews)

Best Sellers Rank: #544,278 in Books (See Top 100 in Books) #359 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks #368 in Books > Computers & Technology > Internet & Social Media > Hacking #484 in Books > Computers & Technology > Networking & Cloud Computing > Network Security

I bought this book to see how it would work as a textbook for a college course, as with many textbooks from Course Technology. My impression is that it can be used in a graduate level, but would fit more to field practioners who already have enough networking and systems knowledge. Eachh chapter lists many tools (almost as laundry-list like) with brief descriptions and screen shots, but not enough detail for those who want to learn more about them. Most chapters (not all) provide Hands-On projects but most of those projects stay in superficial level, asking to download toolX and click menuY to capture trafficZ, but void with indepth analysis.However, this book can work well as a reference book for network forensic analyst. Since there are not yet many good college textbooks on Network Forensics (AFAIK at the time of writing), this book is still worthwhile to have as a reference.

Was looking for a good book with technical quality and falcilidade understanding. I found everything he sought, I am super satisfied. Shipping very fast.Estava em busca de um bom livro, com qualidade técnica e falcilidade de entendimento. Encontrei tudo que buscava, estou super satisfeito. Frete muito rápido.

We will not be able to stop cyber crime, but prevention and knowledge might mitigate the harmfull effects of it. To fully understand the risks and treats, you should read all volumes. But networks are a good start. And remember that an attack is not always comming from outside. Logging is key for a good investigation.

it was very good and nice quality. it would be help me a lot in my education. the dealer who send me this book is maintain a very good qulity

If you have interest on computer security you better to read this book.

Computer Forensics: Investigating Network Intrusions and Cyber Crime (EC-Council Press) Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crime Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare Hacking: How to Computer Hack: An Ultimate Beginner's Guide to Hacking (Programming, Penetration Testing, Network Security) (Cyber Hacking with Virus, Malware and Trojan Testing) Investigating Eating Disorders (Anorexia, Bulimia, and Binge Eating): Real Facts for Real Lives (Investigating Diseases) Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Extrusion Detection: Security Monitoring for Internal Intrusions True Crime: Deadly Serial Killers And Grisly Murder Stories From The Last 100 Years: True Crime Stories From The Past (Serial Killers True Crime) True Crime: The Worlds Weirdest And Most Vicious Killers Of All Time: True Crime Stories Of The Sick Minded Killers (Serial Killers True Crime Book 2) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Cyber Crime and Digital Evidence: Materials and Cases Criminal Procedure: Investigating Crime, 5th (American Casebook Series) Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council) Network Forensics: Tracking Hackers through Cyberspace More Forensics and Fiction: Crime Writers' Morbidly Curious Questions Expertly Answered (Marder and Mayhem) Forensics and Fiction: Clever, Intriguing, and Downright Odd Questions from Crime Writers Cyber Law: Software and Computer Networks (Litigator Series)