• Gratis verzending
  • Al meer dan 1 miljoen studenten bestelden hier

Network Forensics

Davidoff, Sherri,

9780132564717 - Network Forensics

Artikelomschrijving

This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field. - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. Its like a symphony meeting an encyclopedia meeting a spy novel. -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself).

Specificaties

Auteur Davidoff, Sherri,
ISBN/EAN 9780132564717
Druk 1
€ 70,35 € 78,17
Verwachte bezorgdatum: 29-09

Artikelomschrijving

This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field. - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. Its like a symphony meeting an encyclopedia meeting a spy novel. -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself).

Specificaties

Auteur Davidoff, Sherri,
ISBN/EAN 9780132564717
Druk 1