Network forensics : (Record no. 8961)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01997nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520100607.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780132564717 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 8079.C65 .D38 2012 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Davidoff, Sherri |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Network forensics : |
Remainder of title | tracking hackers through cyberspace / |
Statement of responsibility, etc. | Sherri Davidoff and Jonathan Ham |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Upper Saddle River, New Jersey : |
Name of publisher, distributor, etc. | Prentice-Hall, |
Date of publication, distribution, etc. | c2012 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvii, 545 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD49.21 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Part I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER CRIMES -- INVESTIGATION |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ham, Jonathan |
Relator term | co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 01/27/2014 | Purchased - Amazon | 49.21 | GC HV 8079.C65 .D38 2012 c.1 | NULIB000006720 | 05/20/2025 | c.1 | 05/20/2025 | Books | |||||
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 01/27/2014 | Purchased - Amazon | 49.21 | GC HV 8079.C65 .D38 2012 c.2 | NULIB000008359 | 06/18/2025 | c.2 | 05/20/2025 | Books |