- Hardcover: 576 pages
- Publisher: Prentice Hall; 1 edition (June 23, 2012)
- Language: English
- ISBN-10: 0132564718
- ISBN-13: 978-0132564717
- Product Dimensions: 7.1 x 1.4 x 9.2 inches
- Shipping Weight: 2.3 pounds (View shipping rates and policies)
- Average Customer Review: 34 customer reviews
- Amazon Best Sellers Rank: #119,361 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Network Forensics: Tracking Hackers through Cyberspace 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
About the Author
Sherri Davidoff is a founder of LMG Security, an information security consulting and research firm. Her specialties include network penetration testing, digital forensics, social engineering testing, and web application assessments. She holds her S.B. in Computer Science and Electrical Engineering from MIT.
Jonathan Ham has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than two thousand feet underground, taught intrusion analysis to the NSA, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a founder of LMG Security. His favorite field is ip[6:2].
Browse award-winning titles. See more
Top customer reviews
Probably best for an individual with a strong background in networking theory, design and implementation as well as at least a basic knowledge of packet capture and analysis tools, (tcpdump, Wireshark, etc).
This is the "Bible" if networks are important to your company's security or you need to know how to find the top talent in the field.
Not overly technical (some things may be better kept secret) but it will certainly have you thinking about things you may not have known were hidden within your networks. Should be on every networking professional's bookshelf!