Network forensics : tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham.

By: Davidoff, SherriContributor(s): Ham, JonathanPublisher: Upper Saddle River, NJ : Prentice Hall, c2012Description: xxvii, 545 p. : ill. ; 24 cmISBN: 0132564718 (hardcover : alk. paper); 9780132564717 (hardcover : alk. paper)Subject(s): Computer crimes -- Investigation | Computer crimes -- Investigation | Forensic sciences | HackersDDC classification: 363.25968,DAV
Contents:
Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Call number URL Status Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
NFIC 363.25968 DAV (Browse shelf) Link to resource Available MCS37454
Total holds: 0

Part I: Foundation (Page-1) Practical Investigative Strategies (Page-3) Evidence Acquisition (Page-45) Part II: Traffic Analysis (Page-73) Packet Analysis Page-75) Network Forensics Unplugged (Page-199) Network Intrusion Detection and Analysis (Page-257) Part III: Network Devices and Servers (Page-289) Event Log Aggregation, Correlation, and Analysis (Page-291) Switches, Routers, and Firewalls (Page-335) Web Proxies (Page-369) Part IV: Advanced Topics (Page-421) Network Tunneling (Page-423) Malware Forensics (Page-461)

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.