Network forensics: tracking hackers through cyberspace
"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice Hall
2012
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780132565110/?ar |
Zusammenfassung: | "This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxvii, 545 Seiten) illustrations |
ISBN: | 9780132565097 0132565099 9780132565103 0132565102 9780132565110 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047417730 | ||
003 | DE-627-1 | ||
005 | 20240228115017.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9780132565097 |c electronic bk. |9 978-0-13-256509-7 | ||
020 | |a 0132565099 |c electronic bk. |9 0-13-256509-9 | ||
020 | |a 9780132565103 |c electronic bk. |9 978-0-13-256510-3 | ||
020 | |a 0132565102 |c electronic bk. |9 0-13-256510-2 | ||
020 | |a 9780132565110 |9 978-0-13-256511-0 | ||
035 | |a (DE-627-1)047417730 | ||
035 | |a (DE-599)KEP047417730 | ||
035 | |a (ORHE)9780132565110 | ||
035 | |a (DE-627-1)047417730 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a SOC |2 bisacsh | |
082 | 0 | |a 363.25/968 |2 23 | |
100 | 1 | |a Davidoff, Sherri |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network forensics |b tracking hackers through cyberspace |c Sherri Davidoff, Jonathan Ham |
246 | 3 | 3 | |a Tracking hackers through cyberspace |
264 | 1 | |a Upper Saddle River, NJ |b Prentice Hall |c 2012 | |
300 | |a 1 Online-Ressource (xxvii, 545 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out. | ||
650 | 0 | |a Computer crimes |x Investigation | |
650 | 0 | |a Hackers | |
650 | 0 | |a Forensic sciences | |
650 | 0 | |a Computer crimes |v Case studies |x Investigation | |
650 | 2 | |a Forensic Sciences | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Criminalistique | |
650 | 4 | |a Criminalité informatique ; Enquêtes ; Études de cas | |
650 | 4 | |a forensic science | |
650 | 4 | |a BUSINESS & ECONOMICS ; Infrastructure | |
650 | 4 | |a SOCIAL SCIENCE ; General | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Forensic sciences | |
650 | 4 | |a Hackers | |
650 | 4 | |a Social Welfare & Social Work | |
650 | 4 | |a Social Sciences | |
650 | 4 | |a Criminology, Penology & Juvenile Delinquency | |
650 | 4 | |a Case studies | |
700 | 1 | |a Ham, Jonathan |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0132564718 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0132564718 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780132565110/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047417730 |
---|---|
_version_ | 1821494907774173184 |
adam_text | |
any_adam_object | |
author | Davidoff, Sherri |
author2 | Ham, Jonathan |
author2_role | ctb |
author2_variant | j h jh |
author_facet | Davidoff, Sherri Ham, Jonathan |
author_role | aut |
author_sort | Davidoff, Sherri |
author_variant | s d sd |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047417730 (DE-599)KEP047417730 (ORHE)9780132565110 |
dewey-full | 363.25/968 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/968 |
dewey-search | 363.25/968 |
dewey-sort | 3363.25 3968 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04137cam a22006852 4500</leader><controlfield tag="001">ZDB-30-ORH-047417730</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115017.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780132565097</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-13-256509-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132565099</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-13-256509-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780132565103</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-13-256510-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132565102</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-13-256510-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780132565110</subfield><subfield code="9">978-0-13-256511-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047417730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047417730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780132565110</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047417730</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/968</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Davidoff, Sherri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network forensics</subfield><subfield code="b">tracking hackers through cyberspace</subfield><subfield code="c">Sherri Davidoff, Jonathan Ham</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Tracking hackers through cyberspace</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 545 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Forensic Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalistique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes ; Études de cas</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Infrastructure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Welfare & Social Work</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology, Penology & Juvenile Delinquency</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Case studies</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ham, Jonathan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0132564718</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0132564718</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780132565110/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047417730 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:50Z |
institution | BVB |
isbn | 9780132565097 0132565099 9780132565103 0132565102 9780132565110 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvii, 545 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Prentice Hall |
record_format | marc |
spelling | Davidoff, Sherri VerfasserIn aut Network forensics tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham Tracking hackers through cyberspace Upper Saddle River, NJ Prentice Hall 2012 1 Online-Ressource (xxvii, 545 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out. Computer crimes Investigation Hackers Forensic sciences Computer crimes Case studies Investigation Forensic Sciences Criminalité informatique ; Enquêtes Pirates informatiques Criminalistique Criminalité informatique ; Enquêtes ; Études de cas forensic science BUSINESS & ECONOMICS ; Infrastructure SOCIAL SCIENCE ; General Computer crimes ; Investigation Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency Case studies Ham, Jonathan MitwirkendeR ctb 0132564718 Erscheint auch als Druck-Ausgabe 0132564718 |
spellingShingle | Davidoff, Sherri Network forensics tracking hackers through cyberspace Computer crimes Investigation Hackers Forensic sciences Computer crimes Case studies Investigation Forensic Sciences Criminalité informatique ; Enquêtes Pirates informatiques Criminalistique Criminalité informatique ; Enquêtes ; Études de cas forensic science BUSINESS & ECONOMICS ; Infrastructure SOCIAL SCIENCE ; General Computer crimes ; Investigation Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency Case studies |
title | Network forensics tracking hackers through cyberspace |
title_alt | Tracking hackers through cyberspace |
title_auth | Network forensics tracking hackers through cyberspace |
title_exact_search | Network forensics tracking hackers through cyberspace |
title_full | Network forensics tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham |
title_fullStr | Network forensics tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham |
title_full_unstemmed | Network forensics tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham |
title_short | Network forensics |
title_sort | network forensics tracking hackers through cyberspace |
title_sub | tracking hackers through cyberspace |
topic | Computer crimes Investigation Hackers Forensic sciences Computer crimes Case studies Investigation Forensic Sciences Criminalité informatique ; Enquêtes Pirates informatiques Criminalistique Criminalité informatique ; Enquêtes ; Études de cas forensic science BUSINESS & ECONOMICS ; Infrastructure SOCIAL SCIENCE ; General Computer crimes ; Investigation Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency Case studies |
topic_facet | Computer crimes Investigation Hackers Forensic sciences Computer crimes Case studies Investigation Forensic Sciences Criminalité informatique ; Enquêtes Pirates informatiques Criminalistique Criminalité informatique ; Enquêtes ; Études de cas forensic science BUSINESS & ECONOMICS ; Infrastructure SOCIAL SCIENCE ; General Computer crimes ; Investigation Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency Case studies |
work_keys_str_mv | AT davidoffsherri networkforensicstrackinghackersthroughcyberspace AT hamjonathan networkforensicstrackinghackersthroughcyberspace AT davidoffsherri trackinghackersthroughcyberspace AT hamjonathan trackinghackersthroughcyberspace |