FREE Delivery in the UK.
Only 14 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Network Forensics: Tracki... has been added to your Basket

Dispatch to:
To see addresses, please
Or
Please enter a valid UK postcode.
Or
+ £2.80 UK delivery
Used: Like New | Details
Sold by AliaBookStore
Condition: Used: Like New
Comment: Please Read Description Before Buying - This is Paperback/Softcover Used Like Book, International Economy Edition.Black & White Pages, Printed in India, Author , Content & Edition is same as Listed edition. Satisfaction Guaranteed .The access code or CD may be not available with this book. Guaranteed Super Fast Delivery
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Network Forensics: Tracking Hackers through Cyberspace Hardcover – 13 Jun 2012

4.0 out of 5 stars 2 customer reviews

See all 6 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Hardcover
£59.99
£37.12 £23.11
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more

Great Discounts
Shop the Books Outlet. Discover some great deals on top titles. Shop now
£59.99 FREE Delivery in the UK. Only 14 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.
click to open popover


Frequently bought together

  • Network Forensics: Tracking Hackers through Cyberspace
  • +
  • Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
  • +
  • Rtfm: Red Team Field Manual
Total price: £76.09
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.



Product details

  • Hardcover: 576 pages
  • Publisher: Prentice Hall; 01 edition (13 Jun. 2012)
  • Language: English
  • ISBN-10: 0132564718
  • ISBN-13: 978-0132564717
  • Product Dimensions: 18 x 3.6 x 23.4 cm
  • Average Customer Review: 4.0 out of 5 stars 2 customer reviews
  • Amazon Bestsellers Rank: 618,701 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

Product description

"This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field." - Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. "It's like a symphony meeting an encyclopedia meeting a spy novel." -Michael Ford, Corero Network Security On the Internet, every action leaves a mark-in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself).Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire. Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors' web site (lmgsecurity), and follow along to gain hands-on experience. Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.


What other items do customers buy after viewing this item?


Customer reviews

4.0 out of 5 stars
Share your thoughts with other customers
See all 2 customer reviews

Top customer reviews

on 27 July 2017
Format: Hardcover|Verified Purchase
0Comment|Was this review helpful to you?YesNoReport abuse
on 12 October 2014
Format: Hardcover
0Comment|Was this review helpful to you?YesNoReport abuse

Most helpful customer reviews on Amazon.com

Amazon.com: 4.2 out of 5 stars 35 reviews
One person found this helpful.
5.0 out of 5 starsGreat book, highly recommended for every InfoSec professional.
on 19 September 2016 - Published on Amazon.com
Verified Purchase
One person found this helpful.
5.0 out of 5 starsOutstanding!
on 22 October 2016 - Published on Amazon.com
Verified Purchase
One person found this helpful.
5.0 out of 5 starsFive Stars
on 18 May 2016 - Published on Amazon.com
Format: Hardcover|Verified Purchase
One person found this helpful.
5.0 out of 5 starsGreat - get it with the blue team handbook
on 10 September 2014 - Published on Amazon.com
Format: Hardcover|Verified Purchase
One person found this helpful.
5.0 out of 5 starsA must for any security tech.
on 8 June 2015 - Published on Amazon.com
Format: Hardcover|Verified Purchase
Pages with related products. See and discover other items: forensic science

Where's My Stuff?

Delivery and Returns

Need Help?