| 000 | 01307 a2200253 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207171641.0 | ||
| 010 | _a 2012014889 | ||
| 020 | _a0132564718 (hardcover : alk. paper) | ||
| 020 | _a9780132564717 (hardcover : alk. paper) | ||
| 035 | _a(OCoLC)ocn772107819 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a363.25968,DAV |
| 100 | 1 | _aDavidoff, Sherri. | |
| 245 | 1 | 0 |
_aNetwork forensics : _btracking hackers through cyberspace _cSherri Davidoff, Jonathan Ham. |
| 260 |
_aUpper Saddle River, NJ : _bPrentice Hall, _cc2012. |
||
| 300 |
_axxvii, 545 p. : _bill. ; _c24 cm. |
||
| 505 | _aPart I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461) | ||
| 650 | 0 |
_aComputer crimes _xInvestigation |
|
| 650 | 0 |
_aComputer crimes _xInvestigation. |
|
| 650 | 0 | _aForensic sciences. | |
| 650 | 0 | _aHackers. | |
| 700 | 1 | _aHam, Jonathan. | |
| 942 |
_2ddc _cBK |
||
| 999 |
_c218172 _d218172 |
||