Doprava zdarma se Zásilkovnou nad 1 499 Kč
PPL Parcel Shop 54 Balík do ruky 74 Balíkovna 49 PPL 99 Zásilkovna 54

Network Forensics

Jazyk AngličtinaAngličtina
Kniha Pevná
Kniha Network Forensics Sherri Davidoff
Libristo kód: 04473429
Nakladatelství Pearson Education, června 2012
"This is a must-have work for anybody in information security, digital forensics, or involved with i... Celý popis
? points 177 b
1 767
Skladem u dodavatele v malém množství Odesíláme za 14-18 dnů

30 dní na vrácení zboží


Zákazníci také koupili


Browser Hacker's Handbook Wade Alcorn / Brožovaná
common.buy 1 403
Mistrovství v C++ Stephen Prata / Pevná
common.buy 792
Android Hacker's Handbook Joshua J Drake / Brožovaná
common.buy 1 262
Computer Forensics Marie-Helen Maras / Brožovaná
common.buy 3 352

"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity.com), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.

Darujte tuto knihu ještě dnes
Je to snadné
1 Přidejte knihu do košíku a zvolte doručit jako dárek 2 Obratem vám zašleme poukaz 3 Kniha dorazí na adresu obdarovaného

Mohlo by vás také zajímat


TOP
Berserk Deluxe Volume 1 Kentaro Miura / Pevná
common.buy 1 115
TOP
Be More Chill Ned Vizzini / Brožovaná
common.buy 236
TOP Připravujeme
Echoes of Eternity / Brožovaná
common.buy 419
TOP
Oppenheimer / Brožovaná
common.buy 378
I Wrote a Book About Us Justine Edge / Pevná
common.buy 419
Do You Want to be My Friend? Eric Carle / Brožovaná
common.buy 232
Wolf of Wall Street Jordan Belfort / Brožovaná
common.buy 357
Speak Peace in a World of Conflict Marshall B. Rosenberg / Brožovaná
common.buy 347
Attacking Network Protocols James Forshaw / Brožovaná
common.buy 1 138
What I Lost Alexandra Ballard / Brožovaná
common.buy 462
Jrnl Voyager Refill Graph Paper Inc Peter Pauper Press / Pevná
common.buy 163
Attachment John Bowlby / Brožovaná
common.buy 464
Dressed Undressed / Pevná
common.buy 1 475

Přihlášení

Přihlaste se ke svému účtu. Ještě nemáte Libristo účet? Vytvořte si ho nyní!

 
povinné
povinné

Nemáte účet? Získejte výhody Libristo účtu!

Díky Libristo účtu budete mít vše pod kontrolou.

Vytvořit Libristo účet