Home > Store

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer

eBook (Watermarked)

  • Your Price: $31.99
  • List Price: $39.99
  • Estimated Release: Feb 9, 2018
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2018
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 400
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-475587-1
  • ISBN-13: 978-0-13-475587-8

Today, cybersecurity professionals recognize that they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they happen. Investigating The Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working networking and security professionals, senior cybersecurity experts Joseph Muñiz and Aamir Lakhani show exactly how to hunt attackers, track their movements within networks, and halt their data exfiltration and thefts of intellectual property. Muñiz and Lakhani show how to use tools ranging from open source software to enterprise solutions: tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike previous digital forensics books focused primarily on collecting evidence for later prosecution, this one focuses on using digital forensics tools to hunt threats, improve threat intelligence, root out dormant malware, and respond quickly and effectively to network compromises happening right now.

Sample Content

Table of Contents

1. Cyber Crime and Defenses
2. Digital Forensics
3. Building a Lab
4. Investigations
5. Collecting and Preserving Evidence
6. Windows File Forensics
7. Network Forensics
8. Mobile Device and Web
9. Cisco Security Forensic Capabilities
10. Case Study and Wrap-Up


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership