did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Network Forensics Tracking Hackers through Cyberspace

9780132564717

Network Forensics Tracking Hackers through Cyberspace

  • ISBN 13:

    9780132564717

  • ISBN 10:

    0132564718

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 06/13/2012
  • Publisher: PEARSO

List Price $76.99 Save

Rent $49.54
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $76.99 Save $20.45

Used $56.54

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

List Price $76.99 Save $2.68

New $74.31

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Network forensics is transforming the way investigators examine computer crime: they have discovered that the network holds far more evidence than could ever be retrieved from a local hard drive. Network forensic skills are in especially short supply, and professionals are flocking to the scarce resources available for mastering these skills. Now, for the first time, there's a comprehensive and practical book on the subject. Building on their pioneering SANS Institute course, top network forensics experts Jonathan Ham and Sherri Davidoff take readers through an exciting, entertaining, and technically rigorous journey through the skills and principles of successful network investigation. One step at a time, they demonstrate how to recover usable forensic evidence from firewalls, web proxies, IDS, routers, wireless access points, and even raw packet captures. Coverage includes: * Understanding the unique challenges associated with network investigation * Mastering the state-of-the-art OSCAR Network Forensics Investigative Methodology * Acquiring evidence passively, actively, and interactively * Aggregating, correlating, and analyzing event logs * Investigating compromised encryption and SSL interception * And much more Every section contains a real-world case study, and the book culminates with a "Capstone" case study walking through an entire investigation from start to finish, and challenging readers to solve the crime themselves.

Author Biography

Read more