Студенческий сайт КФУ - ex ТНУ » Учебный раздел » Учебные файлы »ПРОГРАММИРОВАНИЕ

Network Forensics: Tracking Hackers through Cyberspace

Sherri Davidoff, Jonathan Ham
Тип: PDF
Категория: ПРОГРАММИРОВАНИЕ
Скачать
Купить
On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.
Другие файлы:

Cryptography and Network Security,4 Ed
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and ne...

Cryptography and Network Security: Principles and Practice, 6th edition
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This tex...

Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks...

BackTrack - Testing Wireless Network Security
Описание: BackTrack - Testing Wireless Network Security looks at what tools hackers use and shows you how to defend yourself against them. Taking you...

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing co...