INSPIRING FUTURES

Advanced security and network forensics: network forensics.

Buchanan, William J (2010) Advanced security and network forensics: network forensics. [Video]

[img] HTML
Available under License Creative Commons Attribution Non-commercial.

Download (497B)
    [img]
    Preview
    PDF
    Available under License Creative Commons Attribution Non-commercial.

    Download (4MB) | Preview

      Abstract/Description

      3 NETWORK FORENSICS
      3.1 Objectives
      3.2 Introduction
      3.3 The key protocols
      3.4 Ethernet, IP and TCP headers
      3.5 TCP connection
      3.6 ARP
      3.7 SYN
      3.8 Application Layer Analysis - FTP
      3.9 ICMP
      3.10 DNS
      3.11 Port scan
      3.12 SYN flood
      3.13 Spoofed addresses
      3.14 Application Layer Analysis - HTTP
      HTTP messages
      3.15 Network logs on hosts
      3.16 Tripwire
      3.17 Tutorial

      Item Type: Video
      Uncontrolled Keywords: Network forensics; network protocols; application protocols; file transfer; tripwire; host trace;
      Dewey Decimal Subjects: 000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
      000 Computer science, information & general works >
      Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
      Item ID: 4148
      Depositing User: Professor Bill Buchanan
      Date Deposited: 25 Jan 2011 14:32
      Last Modified: 25 Jan 2011 14:32
      URI: http://researchrepository.napier.ac.uk/id/eprint/4148

      Actions (login required)

      View Item

      Document Downloads

      More statistics for this item...

      Edinburgh Napier University is a registered Scottish charity. Registration number SC018373