Network Forensics: Tracking Hackers through Cyberspace and over 2 million other books are available for Amazon Kindle . Learn more
FREE Delivery in the UK.
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Network Forensics: Tracki... has been added to your Basket
+ £2.80 UK delivery
Used: Like New | Details
Sold by fatbrainbooks
Condition: Used: Like New
Comment: Dispatch Same Working Day, (Delivery 2-4 business days, Courier For Heavy/Expensive Items) Money Back Guarantee, 99.3% Customer Satisfaction, Prompt Customer Service.
Trade in your item
Get a £7.78
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Forensics: Tracking Hackers Through Cyberspace Hardcover – 13 Jun 2012


See all 4 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Hardcover
"Please retry"
£46.99
£26.24 £25.30
£46.99 FREE Delivery in the UK. Only 2 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Special Offers and Product Promotions

  • When you trade in £15 or more you’ll receive an additional £5 Amazon.co.uk Gift Card for the next time you spend £10 or more.

Frequently Bought Together

Network Forensics: Tracking Hackers Through Cyberspace + The Practice of Network Security Monitoring: Understanding Incident Detection and Response + Applied Network Security Monitoring: Collection, Detection, and Analysis
Price For All Three: £100.76

Buy the selected items together


Trade In this Item for up to £7.78
Trade in Network Forensics: Tracking Hackers Through Cyberspace for an Amazon Gift Card of up to £7.78, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Hardcover: 576 pages
  • Publisher: Prentice Hall; 1 edition (13 Jun. 2012)
  • Language: English
  • ISBN-10: 0132564718
  • ISBN-13: 978-0132564717
  • Product Dimensions: 17.8 x 3.3 x 23.1 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 480,733 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Authors

Discover books, learn about writers, and more.

Product Description

About the Author

Sherri Davidoff is a founder of LMG Security, an information security consulting and research firm. Her specialties include network penetration testing, digital forensics, social engineering testing, and web application assessments. She holds her S.B. in Computer Science and Electrical Engineering from MIT.

 

Jonathan Ham has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than two thousand feet underground, taught intrusion analysis to the NSA, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a founder of LMG Security. His favorite field is ip[6:2].


Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Most Helpful Customer Reviews

By Emmanuel Oboh on 12 Oct. 2014
Format: Hardcover
great book and good seller
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 22 reviews
35 of 36 people found the following review helpful
Incredibly good comprehensive and useful guide to network forensics 28 Jun. 2012
By Ben Rothke - Published on Amazon.com
Format: Hardcover
With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page 25, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the space.

Author's Jonathan Ham and Sherri Davidoff are both SANS Institute instructors, and bring significant real-world experience to every chapter. Martin McKeay has an interview (albeit dated) with the authors on his web site here about their SANS course on network forensics.

In 12 densely written chapters at just over 500 pages, the book covers nearly every aspect within network and digital forensics.

While the book Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet provides a comprehensive overview of the topic; Network Forensics: Tracking Hackers through Cyberspace focuses at the packet level.

Part 2, which is about a third of the book, is spent on traffic analysis, with all-embracing coverage of concepts and topics such as statistical flow analysis, wireless traffic capture and analysis, NIDS detection and analysis, packet logging and more.

Readers should be very comfortable with Wireshark packet capture output, which the book extensively references. Those not quite comfortable with packet capture analysis will likely find this book way over their head.

Part 3 focuses on network devices and logging for all types of network devices. Detailed logging aspects for switches, routers and firewalls are dealt with.

The last 2 chapters deal with advanced topics such as network tunneling and malware forensics.

The book also includes 9 case studies which go into extreme detail on the topic covered. While the notion of a case study in many books is a 2-3 page overview, these case studies are 10-20 pages in length and provide an across-the-board analysis of the topic. Evidence files for each case study are available at the author's web site here.

Network Forensics: Tracking Hackers through Cyberspace is an extremely detailed and comprehensive guide on the topic. It is made for the advanced user who is comfortable with forensic tools such as NetworkMiner and Snort.

For those that are up to the task, Network Forensics: Tracking Hackers through Cyberspace is an invaluable reference that will make the reader a master of the topic.
7 of 7 people found the following review helpful
A scholarly text. 24 Dec. 2012
By Charles W. Hayes - Published on Amazon.com
Format: Hardcover Verified Purchase
Ok, this is a great scholarly text. If you've never used Wireshark or a Ethernet Tap then you will be in for a treat and a lot of tools you haven't ever used before. Otherwise, this work is like most College text, when the first few chapters are a "history of" and then it sort of goes to an explanation of the tools you need. I found several things I didn't know, and a few tips on actually hiding your traffic and obfuscating your internet mixed in the text. It's not Harry Potter, and sadly it didn't make me a wazard, but it's a great book for anyone interested in network forensics. For those who are hacker minded, this is basically a book of "this is how you can / will be caught" so, read it, know it, reverse it... and then see how much you can derive from your own traffic. The exercises seem to be aimed for a school / network which isn't really in existence, aka most of the "test" are more... ok, look at the traffic patterns in the book, and figure out what you are looking for, instead of go to your computers and run this simulation. Overall, I'd give this book a 4 out of 5 stars, because they teach you how to watch the traffic and dissect it, yet give very little information on how to obfuscate your tracks. Then again, if they taught you how to do that, they'd be out of a job. :D
5 of 5 people found the following review helpful
digital tracking 15 Jun. 2013
By John Gardener - Published on Amazon.com
Format: Hardcover
This is well-written, and easy to read. Good footnotes. It starts with foundational stuff, moves on to a very good discussion of traffic analysis, network devices and detailed logging, and advanced stuff including malware, and tunneling. Several useful case studies. Lots of stuff on packet analysis. Supplements at the authors' website are good. It is dense, but easy enough to read, even with a massive page count. It covers most of network forensics. You do want to be familiar with Wireshark.
7 of 8 people found the following review helpful
An OK book it was 11 Sept. 2013
By Dr Anton Chuvakin - Published on Amazon.com
Format: Hardcover
So, I spent way too much time reading this book since it just didn't flow well for me.
The goods: examples, depth of content in some areas
The bads: no coverage of actual (narrowly defined) network forensics, dry style
Personally, I'd recommend this book to people who need to learn how to deal with packets and need lots of examples with explanations and workflows.
2 of 2 people found the following review helpful
World-Class Treatise on a Subject of Ever-Increasing Importance 9 Mar. 2014
By David Barcelou - Published on Amazon.com
Format: Kindle Edition Verified Purchase
There's lot's of material on "computer forensics" but until now this book there's been absolutely nothing on "network forensics".

This is the "Bible" if networks are important to your company's security or you need to know how to find the top talent in the field.

Not overly technical (some things may be better kept secret) but it will certainly have you thinking about things you may not have known were hidden within your networks. Should be on every networking professional's bookshelf!
Were these reviews helpful? Let us know


Feedback