DHL Abholort 4.69 Hermes Kurierdienst 4.99 DHL-Kurier 3.99 Hermes-Stelle 4.49 GLS-Kurierdienst 3.99

Network Forensics

Sprache EnglischEnglisch
Buch Hardcover
Buch Network Forensics Sherri Davidoff
Libristo-Code: 04473429
Verlag Pearson Education, Juni 2012
"This is a must-have work for anybody in information security, digital forensics, or involved with i... Vollständige Beschreibung
? points 218 b
86.93 inkl. MwSt.
Externes Lager in kleiner Menge Wir versenden in 15-20 Tagen

30 Tage für die Rückgabe der Ware


Kunden kauften auch


Android Hacker's Handbook Joshua J Drake / Broschur
common.buy 62.12
Browser Hacker's Handbook Wade Alcorn / Broschur
common.buy 69.18
Computer Forensics Marie-Helen Maras / Broschur
common.buy 133.22

"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.

Verschenken Sie dieses Buch noch heute
Es ist ganz einfach
1 Legen Sie das Buch in Ihren Warenkorb und wählen Sie den Versand als Geschenk 2 Wir schicken Ihnen umgehend einen Gutschein 3 Das Buch wird an die Adresse des beschenkten Empfängers geliefert

Das könnte Sie auch interessieren


TOP
Berserk Deluxe Volume 1 Kentaro Miura / Hardcover
common.buy 45.38
TOP
I Wrote a Book About Us Justine Edge / Hardcover
common.buy 15.42
TOP
Be More Chill Ned Vizzini / Broschur
common.buy 8.76
TOP
Oppenheimer / Broschur
common.buy 15.22
TOP
Speak Peace in a World of Conflict Marshall B. Rosenberg / Broschur
common.buy 16.13
TOP DEMNÄCHST
Networks MARK E. J. NEWMAN / Hardcover
common.buy 92.98
Do You Want to be My Friend? Eric Carle / Broschur
common.buy 10.18
What I Lost Alexandra Ballard / Broschur
common.buy 19.05
Jrnl Voyager Refill Graph Paper Inc Peter Pauper Press / Hardcover
common.buy 6.75
Hacker Playbook Peter Kim / Broschur
common.buy 27.93
Attachment John Bowlby / Broschur
common.buy 21.57
Attacking Network Protocols James Forshaw / Broschur
common.buy 46.49
Metasploit David Kennedy / Broschur
common.buy 42.65
Dressed Undressed / Hardcover
common.buy 58.39

Anmeldung

Melden Sie sich bei Ihrem Konto an. Sie haben noch kein Libristo-Konto? Erstellen Sie es jetzt!

 
obligatorisch
obligatorisch

Sie haben kein Konto? Nutzen Sie die Vorteile eines Libristo-Kontos!

Mit einem Libristo-Konto haben Sie alles unter Kontrolle.

Erstellen Sie ein Libristo-Konto