Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…
Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…
Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation Cardiovascular Biometrics: combining Mechanical and Electrical Signals Live Video Forensics: Source Identification in Lossy Wireless Networks Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild New Algorithms for Secure Outsourcing…