Cargando…

Network forensics : tracking hackers through cyberspace /

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Davidoff, Sherri
Otros Autores: Ham, Jonathan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, NJ : Prentice Hall, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn798947890
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 120712s2012 njua ob 001 0 eng d
010 |a  2012014889 
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d OCLCQ  |d DEBSZ  |d REB  |d OCLCA  |d OCLCQ  |d OCLCF  |d OCLCQ  |d YDX  |d N$T  |d OCLCQ  |d CEF  |d WYU  |d UAB  |d STF  |d VT2  |d CNCEN  |d YT1  |d RDF  |d OCLCO  |d OCLCQ 
019 |a 1065877736  |a 1103250795  |a 1129347136 
020 |a 9780132565097  |q (electronic bk.) 
020 |a 0132565099  |q (electronic bk.) 
020 |a 9780132565103  |q (electronic bk.) 
020 |z 9780132565110 
020 |z 0132565110 
020 |z 0132564718  |q (hardcover) 
020 |z 9780132564717  |q (hardcover) 
020 |a 0132565102  |q (electronic bk.) 
029 1 |a AU@  |b 000049903916 
029 1 |a DEBBG  |b BV040900705 
029 1 |a DEBSZ  |b 378276565 
029 1 |a DEBSZ  |b 381367347 
029 1 |a GBVCP  |b 785440186 
029 1 |a AU@  |b 000067105625 
035 |a (OCoLC)798947890  |z (OCoLC)1065877736  |z (OCoLC)1103250795  |z (OCoLC)1129347136 
037 |a CL0500000151  |b Safari Books Online 
050 4 |a HV8079.C65  |b D348 2012 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
082 0 4 |a 363.25/968  |2 23 
049 |a UAMI 
100 1 |a Davidoff, Sherri. 
245 1 0 |a Network forensics :  |b tracking hackers through cyberspace /  |c Sherri Davidoff, Jonathan Ham. 
246 3 0 |a Tracking hackers through cyberspace 
260 |a Upper Saddle River, NJ :  |b Prentice Hall,  |c ©2012. 
300 |a 1 online resource (xxvii, 545 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 |a “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.” – Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. “It's like a symphony meeting an encyclopedia meeting a spy novel.” –Michael Ford, Corero Network Security On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Hackers. 
650 0 |a Forensic sciences. 
650 0 |a Computer crimes  |x Investigation  |v Case studies. 
650 2 |a Forensic Sciences 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Pirates informatiques. 
650 6 |a Criminalistique. 
650 6 |a Criminalité informatique  |x Enquêtes  |v Études de cas. 
650 7 |a forensic science.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Forensic sciences.  |2 fast  |0 (OCoLC)fst00932011 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Social Welfare & Social Work.  |2 hilcc 
650 7 |a Social Sciences.  |2 hilcc 
650 7 |a Criminology, Penology & Juvenile Delinquency.  |2 hilcc 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
700 1 |a Ham, Jonathan. 
776 0 8 |i Print version:  |a Davidoff, Sherri.  |t Network forensics.  |d Upper Saddle River, NJ : Prentice Hall, ©2012  |z 0132564718  |w (DLC) 2012014889  |w (OCoLC)772107819 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780132565110/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 18067145 
938 |a YBP Library Services  |b YANK  |n 14850637 
938 |a EBSCOhost  |b EBSC  |n 1597470 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25206532 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37814067 
994 |a 92  |b IZTAP