Network forensics tracking hackers through cyberspace

"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal...

Full description

Bibliographic Details
Main Author: Davidoff, Sherri
Other Authors: Ham, Jonathan
Format: eBook
Language:English
Published: Upper Saddle River, NJ Prentice Hall 2012
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03914nmm a2200649 u 4500
001 EB001936670
003 EBX01000000000000001099572
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780132565103 
020 |a 0132565099 
020 |a 9780132565097 
050 4 |a HV8079.C65 
100 1 |a Davidoff, Sherri 
245 0 0 |a Network forensics  |b tracking hackers through cyberspace  |c Sherri Davidoff, Jonathan Ham 
246 3 1 |a Tracking hackers through cyberspace 
260 |a Upper Saddle River, NJ  |b Prentice Hall  |c 2012 
300 |a xxvii, 545 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
653 |a Forensic sciences / fast 
653 |a BUSINESS & ECONOMICS / Infrastructure / bisacsh 
653 |a Criminology, Penology & Juvenile Delinquency / hilcc 
653 |a Forensic Sciences 
653 |a Hackers / fast 
653 |a SOCIAL SCIENCE / General / bisacsh 
653 |a Forensic sciences / http://id.loc.gov/authorities/subjects/sh90001487 
653 |a Criminalistique 
653 |a Pirates informatiques 
653 |a Social Sciences / hilcc 
653 |a Computer crimes / Investigation / Case studies 
653 |a forensic science / aat 
653 |a Criminalité informatique / Enquêtes 
653 |a Computer crimes / Investigation / fast 
653 |a Criminalité informatique / Enquêtes / Études de cas 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493 
653 |a Social Welfare & Social Work / hilcc 
700 1 |a Ham, Jonathan 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780132565110 
776 |z 9780132564717 
776 |z 0132565110 
776 |z 9780132565097 
776 |z 0132564718 
776 |z 9780132565103 
776 |z 0132565099 
776 |z 0132565102 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780132565110/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 363.25/968 
082 0 |a 001.4 
082 0 |a 500 
082 0 |a 364.1 
082 0 |a 330 
520 |a "This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out