Network forensics : tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham.
Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Description: xxvii, 545 p. : ill. ; 24 cmISBN: 0132564718 (hardcover : alk. paper); 9780132564717 (hardcover : alk. paper)Subject(s): Computer crimes -- Investigation | Computer crimes -- Investigation | Forensic sciences | HackersDDC classification: 363.25968,DAV
Contents:
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)
| Item type | Current location | Home library | Collection | Call number | URL | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 363.25968 DAV (Browse shelf) | Link to resource | Available | MCS37454 |
Total holds: 0
Browsing Military College of Signals (MCS) shelves Close shelf browser
| No cover image available | ||||||||
| 363.250968 CAR Windows forensic analysis :(Include CD) DVD toolkit, / | 363.252 BUL SPY Ring | 363.256 SCH Incident response :computer forensics toolkit -(E-BOOK) | 363.25968 DAV Network forensics : | 363.25968 JE Inside cyber warfare (E-BOOK) | 363.34/1 CAM Disasters, accidents, and crises in American history :a reference guide to the nation's most catastrophic events(E-BOOK) | 363.582 ROB Thirty years of World Bank shelter lending :what have we learned?(E-BOOK) |
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)

Book
There are no comments on this title.