Back to skip links

Purchase eTextbooks at the new VitalSource web site. Product options and pricing may differ. Shop Now

Additional product details

ISBN-10 013306753XISBN-13 9780133067538
ISBN-10 0132564718ISBN-13 9780132564717
Author(s): Sherri Davidoff; Jonathan Ham
Publisher: Prentice Hall
Copyright year: © 2012 Pages: 576

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.