Network Forensics Tracking Hackers Through Cyberspace (Record no. 4164)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02438nam a2200253Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | RRU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230713224823.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210901s2017 ||||||||| ||||||| 0|eng|d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789332515888 |
Printed Price | Rs.759.00 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | RRU |
Language of cataloging | English |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | Eng. |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Class No. | 363.25968 |
Item number | DAV |
100 ## - FIRST AUTHOR (IF A PERSON) | |
9 (RLIN) | 1343 |
Name of author | Davidoff, Sherri |
245 #0 - TITLE STATEMENT | |
Title | Network Forensics Tracking Hackers Through Cyberspace |
Statement of responsibility | Sherri Davidoff |
Number of part/section of a work | |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Name of publisher, distributor, etc. | Pearson |
Date of publication, distribution, etc. | 2017 |
Place of publication, distribution, etc. | India |
300 ## - PHYSICAL DESCRIPTION | |
No. of pages | 545p. |
Other physical details | 20.3 x 25.4 x 4.7 cm |
520 ## - SUMMARY, ETC. | |
Summary, etc. | “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”<br/><br/>– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.<br/><br/>“It’s like a symphony meeting an encyclopedia meeting a spy novel.”<br/><br/>–Michael Ford, Corero Network Security<br/><br/>On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.<br/><br/>Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.<br/><br/>Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.<br/><br/>Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensics and find out. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer crimes |
9 (RLIN) | 935 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Forensic sciences |
9 (RLIN) | 896 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Hackers |
9 (RLIN) | 1344 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject heading | Computer crimes--Investigation |
9 (RLIN) | 1345 |
700 ## - ADDITIONAL AUTHOR (INDIVIDUAL) | |
9 (RLIN) | 1348 |
Author name | Ham, Jonathan |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan (e.g. reference copy) | Home library | Current library | Date acquired | Inventory number | Total Checkouts | Full call number | Accession No | Date last seen | Date last checked out | Item MRP (printed price) | Price effective from | Koha item type | Total Renewals |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 26/02/2018 | 06939 | 2 | 363.25968 DAV | 6939 | 01/05/2022 | 01/05/2022 | 759.00 | 02/09/2021 | Books | |||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 26/02/2018 | 06940 | 363.25968 DAV | 6940 | 02/09/2021 | 759.00 | 02/09/2021 | Books | |||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 26/02/2018 | 06941 | 363.25968 DAV | 6941 | 02/09/2021 | 759.00 | 02/09/2021 | Books | |||||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 26/02/2018 | 06942 | 1 | 363.25968 DAV | 6942 | 04/03/2023 | 02/02/2023 | 759.00 | 02/09/2021 | Books | 1 | ||||
Dewey Decimal Classification | Rashtriya Raksha University | Rashtriya Raksha University | 26/02/2018 | 06943 | 1 | 363.25968 DAV | 6943 | 13/07/2023 | 29/06/2023 | 759.00 | 02/09/2021 | Books |