Network forensics : tracking hackers through cyberspace / Sherri Davidoff and Jonathan Ham

By: Davidoff, Sherri [author]Contributor(s): Ham, Jonathan [co-author]Material type: TextTextPublication details: Upper Saddle River, NJ : Prentice Hall, c2012Description: xxvii, 545 pages : illustrations ; 24 cmISBN: 9780132564717Subject(s): COMPUTER CRIMES -- INVESTIGATION | HACKERS | FORENSIC SCIENCES | COMPUTER CRIMES -- INVESTIGATION -- CASE STUDIESLOC classification: HV 8079.C65 .D38 2012
Contents:
Part I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics.
Summary: "Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Home library Collection Shelving location Call number Copy number Status Date due Barcode
Books Books LRC - Main
National University - Manila
Digital Forensic General Circulation GC HV 8079.C65 .D38 2012 c.1 (Browse shelf (Opens below)) c.1 Available NULIB000006720
Books Books LRC - Main
National University - Manila
Digital Forensic General Circulation GC HV 8079.C65 .D38 2012 c.2 (Browse shelf (Opens below)) c.2 Available NULIB000008359

Includes bibliographical references and index.

Part I: Foundation --
Practical investigative strategies --
Technical fundamentals --
Evidence acquisition --
Part II: Traffic analysis --
Packet analysis --
Statistical flow analysis --
Wireless : network forensics unplugged --
Network intrusion detection and analysis --
Part III: Network devices and servers --
Event log aggregation, correlation, and analysis --
Web proxies --
Part IV: Advanced topics --
Network tunneling --
Malware forensics.

"Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher.

There are no comments on this title.

to post a comment.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA