The Fictioning Horror Sale
 
 

Recently Viewed clear list


Original Essays | September 4, 2014

Edward E. Baptist: IMG The Two Bodies of The Half Has Never Been Told: Slavery and the Making of American Capitalism



My new book, The Half Has Never Been Told: Slavery and the Making of American Capitalism, is the story of two bodies. The first body was the new... Continue »
  1. $24.50 Sale Hardcover add to wish list

spacer
Qualifying orders ship free.
$74.99
New Hardcover
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
3 Remote Warehouse Computers Reference- General

Network Forensics: Tracking Hackers Through Cyberspace

by

Network Forensics: Tracking Hackers Through Cyberspace Cover

ISBN13: 9780132564717
ISBN10: 0132564718
Condition:
All Product Details

Only 3 left in stock at $74.99!

 

Synopses & Reviews

Publisher Comments:

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”

– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.

 

“It’s like a symphony meeting an encyclopedia meeting a spy novel.”

–Michael Ford, Corero Network Security

 

On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

 

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

 

Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.

 

Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out.

 

Synopsis:

On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

 

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

 

Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.

 

Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out!

 

Synopsis:

Network forensics is transforming the way investigators examine computer crime: they have discovered that the network holds far more evidence than could ever be retrieved from a local hard drive. Network forensic skills are in especially short supply, and professionals are flocking to the scarce resources available for mastering these skills. Now, for the first time, there's a comprehensive and practical book on the subject. Building on their pioneering SANS Institute course, top network forensics experts Jonathan Ham and Sherri Davidoff take readers through an exciting, entertaining, and technically rigorous journey through the skills and principles of successful network investigation. One step at a time, they demonstrate how to recover usable forensic evidence from firewalls, web proxies, IDS, routers, wireless access points, and even raw packet captures. Coverage includes: * Understanding the unique challenges associated with network investigation * Mastering the state-of-the-art OSCAR Network Forensics Investigative Methodology * Acquiring evidence passively, actively, and interactively * Aggregating, correlating, and analyzing event logs * Investigating compromised encryption and SSL interception * And much more Every section contains a real-world case study, and the book culminates with a "Capstone" case study walking through an entire investigation from start to finish, and challenging readers to solve the crime themselves.

About the Author

Sherri Davidoff is a founder of LMG Security, an information security consulting and research firm. Her specialties include network penetration testing, digital forensics, social engineering testing, and web application assessments. She holds her S.B. in Computer Science and Electrical Engineering from MIT.

 

Jonathan Ham has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than two thousand feet underground, taught intrusion analysis to the NSA, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a founder of LMG Security. His favorite field is ip[6:2].

Table of Contents

Investigative Case Studies

Challenges for Network Investigations

Storage

Network Tunneling

Passive Evidence Acquisition

Hardware

Software

Packet Analysis

Network Forensics Investigative Methodology (OSCAR)

Active and Interactive Evidence Acquisition

Routers

Firewalls

Event Log Aggregation, Correlation, and Analysis

Network Intrusion Detection and Analysis

Web Proxies, Encryption, and SSL Interception

Wireless

Capstone Case Study

References

 

What Our Readers Are Saying

Add a comment for a chance to win!
Average customer rating based on 1 comment:

rdbiker, January 5, 2013 (view all comments by rdbiker)
Tech books this well written are a rarity.
Was this comment helpful? | Yes | No

Product Details

ISBN:
9780132564717
Author:
Davidoff, Sherri
Publisher:
Prentice Hall
Author:
Ham, Jonathan
Subject:
Internet - Security
Subject:
Internet - General
Subject:
cybersecurity; hacking; computer forensics
Copyright:
Edition Description:
Trade paper
Publication Date:
20120521
Binding:
HARDCOVER
Language:
English
Pages:
576
Dimensions:
9.1 x 7 x 1.3 in 1070 gr

Other books you might like

  1. The Accountant's Guide to the...
    New Hardcover $21.99

Related Subjects

Business » Investing
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Forensics
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » Security » General
History and Social Science » Crime » Forensics and Evidence

Network Forensics: Tracking Hackers Through Cyberspace New Hardcover
0 stars - 0 reviews
$74.99 In Stock
Product details 576 pages Prentice Hall - English 9780132564717 Reviews:
"Synopsis" by , On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.

 

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.

 

Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.

 

Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out!

 

"Synopsis" by , Network forensics is transforming the way investigators examine computer crime: they have discovered that the network holds far more evidence than could ever be retrieved from a local hard drive. Network forensic skills are in especially short supply, and professionals are flocking to the scarce resources available for mastering these skills. Now, for the first time, there's a comprehensive and practical book on the subject. Building on their pioneering SANS Institute course, top network forensics experts Jonathan Ham and Sherri Davidoff take readers through an exciting, entertaining, and technically rigorous journey through the skills and principles of successful network investigation. One step at a time, they demonstrate how to recover usable forensic evidence from firewalls, web proxies, IDS, routers, wireless access points, and even raw packet captures. Coverage includes: * Understanding the unique challenges associated with network investigation * Mastering the state-of-the-art OSCAR Network Forensics Investigative Methodology * Acquiring evidence passively, actively, and interactively * Aggregating, correlating, and analyzing event logs * Investigating compromised encryption and SSL interception * And much more Every section contains a real-world case study, and the book culminates with a "Capstone" case study walking through an entire investigation from start to finish, and challenging readers to solve the crime themselves.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.