|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn798947890 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120712s2012 njua ob 001 0 eng d |
010 |
|
|
|a 2012014889
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d OCLCQ
|d DEBSZ
|d REB
|d OCLCA
|d OCLCQ
|d OCLCF
|d OCLCQ
|d YDX
|d N$T
|d OCLCQ
|d CEF
|d WYU
|d UAB
|d STF
|d VT2
|d CNCEN
|d YT1
|d RDF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1065877736
|a 1103250795
|a 1129347136
|
020 |
|
|
|a 9780132565097
|q (electronic bk.)
|
020 |
|
|
|a 0132565099
|q (electronic bk.)
|
020 |
|
|
|a 9780132565103
|q (electronic bk.)
|
020 |
|
|
|z 9780132565110
|
020 |
|
|
|z 0132565110
|
020 |
|
|
|z 0132564718
|q (hardcover)
|
020 |
|
|
|z 9780132564717
|q (hardcover)
|
020 |
|
|
|a 0132565102
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000049903916
|
029 |
1 |
|
|a DEBBG
|b BV040900705
|
029 |
1 |
|
|a DEBSZ
|b 378276565
|
029 |
1 |
|
|a DEBSZ
|b 381367347
|
029 |
1 |
|
|a GBVCP
|b 785440186
|
029 |
1 |
|
|a AU@
|b 000067105625
|
035 |
|
|
|a (OCoLC)798947890
|z (OCoLC)1065877736
|z (OCoLC)1103250795
|z (OCoLC)1129347136
|
037 |
|
|
|a CL0500000151
|b Safari Books Online
|
050 |
|
4 |
|a HV8079.C65
|b D348 2012
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.25/968
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Davidoff, Sherri.
|
245 |
1 |
0 |
|a Network forensics :
|b tracking hackers through cyberspace /
|c Sherri Davidoff, Jonathan Ham.
|
246 |
3 |
0 |
|a Tracking hackers through cyberspace
|
260 |
|
|
|a Upper Saddle River, NJ :
|b Prentice Hall,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xxvii, 545 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.” – Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. “It's like a symphony meeting an encyclopedia meeting a spy novel.” –Michael Ford, Corero Network Security On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Forensic sciences.
|
650 |
|
0 |
|a Computer crimes
|x Investigation
|v Case studies.
|
650 |
|
2 |
|a Forensic Sciences
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Criminalistique.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes
|v Études de cas.
|
650 |
|
7 |
|a forensic science.
|2 aat
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Forensic sciences.
|2 fast
|0 (OCoLC)fst00932011
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Social Welfare & Social Work.
|2 hilcc
|
650 |
|
7 |
|a Social Sciences.
|2 hilcc
|
650 |
|
7 |
|a Criminology, Penology & Juvenile Delinquency.
|2 hilcc
|
655 |
|
7 |
|a Case studies.
|2 fast
|0 (OCoLC)fst01423765
|
700 |
1 |
|
|a Ham, Jonathan.
|
776 |
0 |
8 |
|i Print version:
|a Davidoff, Sherri.
|t Network forensics.
|d Upper Saddle River, NJ : Prentice Hall, ©2012
|z 0132564718
|w (DLC) 2012014889
|w (OCoLC)772107819
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780132565110/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18067145
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14850637
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1597470
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25206532
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37814067
|
994 |
|
|
|a 92
|b IZTAP
|