Network Forensics Tracking Hackers Through Cyberspace
Network Forensics Tracking Hackers Through Cyberspace
Regular price
Checking stock...
Regular price
Checking stock...
The feel-good place to buy books
- Free UK delivery over £5
- 10% off preloved books when you join +Plus
- Buying preloved emits 46% less CO2 than new
- Give your books a new home - sell them back to us!

Network Forensics Tracking Hackers Through Cyberspace by Sherri Davidoff
This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field. Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. It s like a symphony meeting an encyclopedia meeting a spy novel. Michael Ford, Corero Network Security On the Internet, every action leaves a mark in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect s web surfing history and cached web pages, too from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out.
Sherri Davidoff is a cybersecurity expert, author, speaker, and CEO of both LMG Security and BrightWise, Inc. She is a recognized expert in digital forensics and cybersecurity, and is coauthor of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012). Sherri has consulted and/or conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC, and many more. She is a faculty member at the Pacific Coast Banking School, and is a frequent contributor of education articles and webinars. She is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds a degree in computer science and electrical engineering from MIT.
| SKU | Unavailable |
| ISBN 13 | 9789332515888 |
| ISBN 10 | 9332515883 |
| Title | Network Forensics Tracking Hackers Through Cyberspace |
| Author | Sherri Davidoff |
| Condition | Unavailable |
| Binding Type | Paperback |
| Publisher | Pearson India |
| Year published | 2013-01-01 |
| Number of pages | 0 |
| Cover note | Book picture is for illustrative purposes only, actual binding, cover or edition may vary. |
| Note | Unavailable |