Table of Contents
- Becoming Network 007s
- Laying Hands on Evidence
- Capturing & Analyzing Data ? Packets
- Going Wireless
- Catching Intruders in the Network
- Connecting the Dots ? Event Logs
- Proxies, Firewalls and Routers
- Smuggling Forbidden Protocols ? Network Tunneling
- Understanding Malware Forensics
- Closing the Deal ? Solving the Case

