Description
A Guide for Investigating Network-Based Criminal Cases
Table of Contents
PART I INTRODUCTIONCHAPTER 1 What Is Network Forensics?PART II GATHERING EVIDENCECHAPTER 2 Capturing Network Traffic CHAPTER 3 Other Network EvidencePART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARECHAPTER 4 Deciphering a TCP Header CHAPTER 5 Using Snort for Network-Based ForensicsPART IV COMMERCIAL NETWORK FORENSICS APPLICATIONSCHAPTER 6 Commercial NetFlow Applications CHAPTER 7 NetWitness Investigator CHAPTER 8 SilentRunner by AccessDataPART V MAKING YOUR NETWORK FORENSICS CASECHAPTER 9 Incorporating Network Forensics into Incident Response Plans CHAPTER 10 Legal Implications and Considerations CHAPTER 11 Putting It All TogetherPART VI THE FUTURE OF NETWORK FORENSICSCHAPTER 12 The Future of Cloud Computing CHAPTER 13 The Future of Network Forensics



