Network forensics : tracking hackers through cyberspace
Sherri Davidoff, Jonathan Ham.
- Upper Saddle River, NJ : Prentice Hall, c2012.
- xxvii, 545 p. : ill. ; 24 cm.
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)