Network forensics : tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham.
Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Description: xxvii, 545 p. : ill. ; 24 cmISBN: 0132564718 (hardcover : alk. paper); 9780132564717 (hardcover : alk. paper)Subject(s): Computer crimes -- Investigation | Computer crimes -- Investigation | Forensic sciences | HackersDDC classification: 363.25968,DAV
Contents:
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)
| Item type | Current location | Home library | Collection | Call number | URL | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | NFIC | 363.25968 DAV (Browse shelf) | Link to resource | Available | MCS37454 |
Total holds: 0
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)

Book
There are no comments on this title.