প্রিয় ,
সেদিন আপনার কার্টে কিছু বই রেখে কোথায় যেন চলে গিয়েছিলেন।
মিলিয়ে দেখুন তো বইগুলো ঠিক আছে কিনা?
TK. 1,494
bKash পেমেন্টে ১০% ইনস্ট্যান্ট ক্যাশব্যাক
৫০০+ টাকা বিকাশ পেমেন্ট করলেই ফ্রি শিপিং
Control Systems Learn to recognize hackers tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyse a real-world wireless encryption cracking attack and then crack the key yourself. Reconstruct a suspects web surfing history and cached web pages, too from a web proxy. Uncover DNS tunnelled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Table of Contents
*
Part I: Foundation
*
Part II: Traffic Analysis
*
Part III: Network Devices and Servers
*
Part IV: Advanced Topics
Title | Network Forensics : Tracking Hackers through Cyberspace |
Author | Sherri Davidoff , Jonathan Ham |
Publisher | Pearson |
ISBN | 9789332515888 |
Edition | 1st Edition, 2013 |
Number of Pages | 576 |
Country | India |
Language | English |
Have a question regarding the product? Ask Us
Please log in to write question Log in
Help: 16297 or 09609616297 24 Hours a Day, 7 Days a Week
Pay cash on delivery Pay cash at your doorstep
Service All over Bangladesh
Happy Return All over Bangladesh
demo content