01282 a2200241 4500003000500000005001700005010001700022020004000039020004300079035002400122040000900146082001800155100002200173245009400195260005300289300003600342505053600378650003500914650003600949650002300985650001301008700001901021Nust20170207171641.0 a 2012014889 a0132564718 (hardcover : alk. paper) a9780132564717 (hardcover : alk. paper) a(OCoLC)ocn772107819 cNust00a363.25968,DAV1 aDavidoff, Sherri.10aNetwork forensics :btracking hackers through cyberspace cSherri Davidoff, Jonathan Ham. aUpper Saddle River, NJ :bPrentice Hall,cc2012. axxvii, 545 p. :bill. ;c24 cm. aPart I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)  0aComputer crimesxInvestigation 0aComputer crimesxInvestigation. 0aForensic sciences. 0aHackers.1 aHam, Jonathan.