Network Forensics : Tracking Hackers through Cyberspace (Paperback) | Book
1,480.00৳ 1,494.00৳ (-1%)
Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyse a real-world wireless encryption cracking attack and then crack the key yourself. Reconstruct a suspects web surfing history and cached web pages, too from a web proxy. Uncover DNS tunnelled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Vendor Information
- No ratings found yet!
-
-
31.00৳
50.00৳কুরআন ও সহীহ হাদিসের আলোকে নবীজীর স. মে’রাজ
31.00৳50.00৳ -
14,881.00৳
14,931.00৳Woodroffe And Amir Ali Law Of Evidence (Set Of 4 Volumes) | Textbook for laws
14,881.00৳14,931.00৳ -
Reviews
There are no reviews yet.