Limit search to available items
Book Cover
Author Davidoff, Sherri, author

Title Network forensics : tracking hackers through cyberspace / Sherri Davidoff, Jonathan Ham
Published Upper Saddle River, NJ : Prentice Hall, [2012]


Location Call no. Vol. Availability
 MELB  363.25968 Dav/Nft  AVAILABLE
 W'PONDS  363.25968 Dav/Nft  AVAILABLE
 W'PONDS  363.25968 Dav/Nft  AVAILABLE
 MELB  363.25968 Dav/Nft  AVAILABLE
 MELB  363.25968 Dav/Nft  AVAILABLE
Description xxvii, 545 pages : illustrations ; 24 cm
Contents Part I: Foundation -- Practical investigative strategies -- Technical fundamentals -- Evidence acquisition -- Part II: Traffic analysis -- Packet analysis -- Statistical flow analysis -- Wireless : network forensics unplugged -- Network intrusion detection and analysis -- Part III: Network devices and servers -- Event log aggregation, correlation, and analysis -- Web proxies -- Part IV: Advanced topics -- Network tunneling -- Malware forensics
Summary On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in this text. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack and then crack the key yourself. Reconstruct a suspects web surfing history and cached web pages, too from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (, and follow along to gain hands-on experience
Notes Formerly CIP. Uk
Bibliography Includes bibliographical references and index
Subject Computer crimes -- Investigation -- Case studies.
Computer crimes -- Investigation.
Forensic sciences.
Genre/Form Case studies.
Author Ham, Jonathan.
LC no. 2012014889
ISBN 9780132564717 (hardback)
Other Titles Tracking hackers through cyberspace