books

Record Details



Enlarge cover image for Network forensics : tracking hackers through cyberspace / Sherri Davidoff, Jonathan Ham. Book

Network forensics : tracking hackers through cyberspace / Sherri Davidoff, Jonathan Ham.

Davidoff, Sherri. (Author). Ham, Jonathan. (Added Author).

Summary:

"Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher.

Record details

  • ISBN: 0132564718
  • ISBN: 9780132564717
  • Physical Description: xxvii, 545 pages : illustrations ; 24 cm
  • Publisher: Upper Saddle River, NJ : Prentice Hall, ©2012.

Content descriptions

Bibliography, etc. Note:
Includes bibliographical references and index.
Formatted Contents Note:
Part I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics.
Subject:
Computer crimes > Investigation.
Hackers.
Forensic sciences.
Computer crimes > Investigation > Case studies.
Forensic Sciences
Criminalité informatique > Enquêtes.
Pirates informatiques.
Criminalistique.
Criminalité informatique > Enquêtes > Études de cas.
forensic science.
Computer crimes > Investigation.
Hackers.
Forensic sciences.
Computerforensik
Internet
Genre:
Case studies.
Case studies.
Études de cas.

Available copies

  • 1 of 1 copy available at North Carolina Community Colleges Evergreen. (Show)
  • 1 of 1 copy available at Southwestern Community College.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Southwestern Community College Holt Library HV 8079 .C65 D348 2012 (Text) 33242000623115 General Collection Available -

Electronic resources