Back to skip links

Additional product details

eText: 
ISBN-10 013306753XISBN-13 9780133067538
Print: 
ISBN-10 0132564718ISBN-13 9780132564717
Author(s): Sherri Davidoff; Jonathan Ham
Publisher: Prentice Hall
Copyright year: © 2012 Pages: 576
Description

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

Three Ways to Study
with eTextbooks!

  • Read online from your computer or mobile device.
  • Read offline on select browsers and devices when the internet won't be available.
  • Print pages to fit your needs.

CourseSmart eTextbooks let you study the best way – your way.