Network forensics : tracking hackers through cyberspace / Sherri Davidoff and Jonathan Ham
Material type:
- 9780132564717
- HV 8079.C65 .D38 2012

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC HV 8079.C65 .D38 2012 c.1 (Browse shelf(Opens below)) | c.1 | Available | NULIB000006720 | ||
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC HV 8079.C65 .D38 2012 c.2 (Browse shelf(Opens below)) | c.2 | Available | NULIB000008359 |
Includes bibliographical references and index.
Part I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics.
"Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience."--From Publisher.
There are no comments on this title.