000 01997nam a2200241Ia 4500
003 NULRC
005 20250520100607.0
008 250520s9999 xx 000 0 und d
020 _a9780132564717
040 _cNULRC
050 _aHV 8079.C65 .D38 2012
100 _aDavidoff, Sherri
_eauthor
245 0 _aNetwork forensics :
_btracking hackers through cyberspace /
_cSherri Davidoff and Jonathan Ham
260 _aUpper Saddle River, New Jersey :
_bPrentice-Hall,
_cc2012
300 _axxvii, 545 pages :
_billustrations ;
_c24 cm.
365 _bUSD49.21
504 _aIncludes bibliographical references and index.
505 _aPart I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics.
520 _a"Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher.
650 _aCOMPUTER CRIMES -- INVESTIGATION
700 _aHam, Jonathan
_eco-author
942 _2lcc
_cBK
999 _c8961
_d8961