Summary
This final chapter sums up our journey in developing an understanding of network forensics. Along the way, we have seen myriad sources of evidence, artifacts created by attacker activities, as well as techniques and processes required to acquire and analyze them. You have learned how to put a report together to present our findings and also act upon your learning's from the investigation.
While this book acts as a starting point and helps in building a foundation in the network forensics area, remember that it is a big world out there and there is no end to the knowledge that one can and should gather as we boldly proceed forward in this field.
Thanks for being a part of this journey. I hope that it has been an interesting one and that I have been successful in kindling your interest in a very exciting new field.