Table of Contents
- Introduction to Network Forensics
- Technical Concepts and Acquiring Evidence
- Deep Packet Inspection
- Statistical flow analysis
- Combating Tunneling and Encryption
- Investigating Good, Known and the Ugly Malware
- Investigating C2 Servers
- Investigating and Analyzing Logs
- WLAN Forensics
- Evidence Segregation

