Sherri Davidoff - Network Forensics: Tracking Hackers through Cyberspace
Here you can read online Sherri Davidoff - Network Forensics: Tracking Hackers through Cyberspace full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Upper Saddle River, NJ, year: 2012, publisher: Prentice Hall, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Network Forensics: Tracking Hackers through Cyberspace
- Author:
- Publisher:Prentice Hall
- Genre:
- Year:2012
- City:Upper Saddle River, NJ
- Rating:3 / 5
- Favourites:Add to favourites
- Your mark:
- 60
- 1
- 2
- 3
- 4
- 5
Network Forensics: Tracking Hackers through Cyberspace: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Network Forensics: Tracking Hackers through Cyberspace" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Network Forensics: Tracking Hackers through Cyberspace — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Network Forensics: Tracking Hackers through Cyberspace" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
Tracking Hackers through Cyberspace
Sherri Davidoff
Jonathan Ham
Upper Saddle River, NJ Boston Indianapolis San Francisco
New York Toronto Montreal London Munich Paris Madrid
Capetown Sydney Tokyo Singapore Mexico City
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.
The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
For sales outside the United States please contact:
International Sales
Visit us on the Web: informit.com/ph
Library of Congress Cataloging-in-Publication Data
Davidoff, Sherri.
Network forensics : tracking hackers through cyberspace / Sherri Davidoff, Jonathan Ham.
p. cm.
Includes bibliographical references and index.
ISBN 0-13-256471-8 (hardcover : alk. paper)
1. Computer crimesInvestigation. 2. Computer hackers. 3. Forensic sciences. 4. Computer crimesInvestigationCase studies. I. Ham, Jonathan. II. Title.
HV8079.C65D348 2012
363.25968dc23 2012014889
Copyright 2012 Pearson Education, Inc.
All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by an means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to (201) 236-3290.
ISBN-13: 978-0-13-256471-7
ISBN-10: 0-13-256471-8
Text printed in the United States on recycled paper at Courier in Westford, Massachusetts.
First printing, May 2012
To my mother, father, and sister.
Thank you for teaching me to follow my dreams
and for your endless encouragement and support.
SD
For Charlie and Violet,
and the rest of my family,
whose patience has made this possible.
JH
May you find what you seek.
An ancient curse; origin unknown.
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, the skilled practice of a practical occupation. He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance.
Cybersecuritys hallmark is its rate of change, both swift incremental change and the intermittent surprise. In the lingo of mathematics, the cybersecurity workfactor is the integral of a brisk flux of step functions punctuated by impulses. My ancestor refined his craft without having to address a change in walnut or steel or linseed. The refinement of craft in cybersecurity is not so easy.
Forensics might at first seem to be a simple effort to explain the past, and thus an affectation. It is not, and the reason is complexity. Complexity is cumulative and, as the authors say at the outset, enough has accumulated that it is impossible to know everything about even a de minimus network. Forensics purpose, then, is to discover meaningful facts in and about the network and the infrastructure that were not previously known. Only after those facts are known is there any real opportunity to improve the future.
Forensics is a craft. Diligence can and does improve its practice. The process of forensic discovery is dominated by ruling out potential explanations for the events under study. Like sculpture, where the aim is to chip away all the stone that doesnt look like an elephant, forensics chips away all the ways in which what was observed didnt happen. In the terms popularized by EF Schumacher, forensics is a convergent problem where cybersecurity is a divergent one; in other words, as more effort is put into forensics, the solution set tends to converge to one answer, an outcome that does not obtain for the general cybersecurity problem.
Perhaps we should say that forensics is not a security discipline but rather an insecurity discipline. Security is about potential events, consistent with Peter Bernsteins definition: Risk is simply that more things can happen than will. Forensics does not have to induce all the possibilities that accumulated complexity can concoct, but rather to deduce the path by which some part of the observable world came to be as it is. Whereas, in general, cybersecurity the offense has a permanent structural advantage, in forensics it is the defense that has superiority.
That forensics is a craft and that forensics holds an innate strategic advantage are factual generalities. For you, the current or potential practitioner, the challenge is to hone your craft to where that strategic advantage is yoursnot just theoretically but in operational reality. For that you need this book.
It is the duty of teachers to be surpassed by their students, but it is also the duty of the student to surpass their teacher. The teachers you have before you are very good; surpassing them will be nontrivial. In the end, a surpassing craft requires knowing what parts of your then current toolbox are eternal and which are subject to the obsolescence that comes with progress. It is likewise expeditious to know what it is that you dont know. For that, this books breadth is directly useful.
Because every forensics investigation is, in principle, different, the tools that will be needed for one study may well be a different set from those needed for another study. The best mechanics have all the specialized tools they can need, but may use a few tools far more than others. A collection of tools is only so good as your knowledge of it as a collection of tools, not necessarily that youve used each tool within the last week. Nicholas Taleb described the library of Umberto Eco as an anti-library that... should contain as much of what you do not know as your financial means, mortgage rates, and the real-estate market allows you to put there.
You, dear reader, hold just such an anti-library of forensics in your hand. Be grateful, and study hard.
Daniel E. Geer, Jr., Sc.D.
Every day, more bits of data flow across the Internet than there are grains of sand on all the beaches in the world. According to the Cisco Visual Networking Index, the total global IP traffic for 2011 was forecast to be approximately 8.4 * 1018 bits per day. Meanwhile, mathematicians at the University of Hawaii have estimated the number of grains of sand on all the beaches in the world to be approximately 7.5 * 1018 grains. According to Cisco, global IP traffic is expected to increase at an annual growth rate of 32% per year, so by the time you read this, the number of bits of data flowing across the Internet
Font size:
Interval:
Bookmark:
Similar books «Network Forensics: Tracking Hackers through Cyberspace»
Look at similar books to Network Forensics: Tracking Hackers through Cyberspace. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Network Forensics: Tracking Hackers through Cyberspace and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.