Network Forensics : Tracking Hackers through Cyberspace (Paperback) | Book
Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyse a real-world wireless encryption cracking attack and then crack the key yourself. Reconstruct a suspects web surfing history and cached web pages, too from a web proxy. Uncover DNS tunnelled traffic. Dissect the Operation Aurora exploit, caught on the wire.
- No ratings found yet!