<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01307    a2200253   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207171641.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2012014889</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0132564718 (hardcover : alk. paper)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9780132564717 (hardcover : alk. paper)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
    <subfield code="a">(OCoLC)ocn772107819</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">363.25968,DAV</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Davidoff, Sherri.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Network forensics :</subfield>
    <subfield code="b">tracking hackers through cyberspace </subfield>
    <subfield code="c">Sherri Davidoff, Jonathan Ham.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Upper Saddle River, NJ :</subfield>
    <subfield code="b">Prentice Hall,</subfield>
    <subfield code="c">c2012.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xxvii, 545 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45)  Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199)  Network Intrusion Detection and Analysis (Page-257)  Part III: Network Devices and Servers (Page-289)  Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335)  Web Proxies (Page-369)  Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461) </subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Investigation</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer crimes</subfield>
    <subfield code="x">Investigation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Forensic sciences.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Hackers.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Ham, Jonathan.</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">218172</subfield>
    <subfield code="d">218172</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">363.25968  DAV</subfield>
    <subfield code="p">MCS37454</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
