000 | 01997nam a2200241Ia 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20250520100607.0 | ||
008 | 250520s9999 xx 000 0 und d | ||
020 | _a9780132564717 | ||
040 | _cNULRC | ||
050 | _aHV 8079.C65 .D38 2012 | ||
100 |
_aDavidoff, Sherri _eauthor |
||
245 | 0 |
_aNetwork forensics : _btracking hackers through cyberspace / _cSherri Davidoff and Jonathan Ham |
|
260 |
_aUpper Saddle River, New Jersey : _bPrentice-Hall, _cc2012 |
||
300 |
_axxvii, 545 pages : _billustrations ; _c24 cm. |
||
365 | _bUSD49.21 | ||
504 | _aIncludes bibliographical references and index. | ||
505 | _aPart I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics. | ||
520 | _a"Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher. | ||
650 | _aCOMPUTER CRIMES -- INVESTIGATION | ||
700 |
_aHam, Jonathan _eco-author |
||
942 |
_2lcc _cBK |
||
999 |
_c8961 _d8961 |