Series: EC-Council Press
Paperback: 400 pages
Publisher: Cengage Learning; 1 edition (September 16, 2009)
Product Dimensions: 10.7 x 8.4 x 1 inches
Shipping Weight: 2 pounds (View shipping rates and policies)
Average Customer Review: 4.4 out of 5 stars See all reviews (5 customer reviews)
Best Sellers Rank: #544,278 in Books (See Top 100 in Books) #359 in Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs > Networks #368 in Books > Computers & Technology > Internet & Social Media > Hacking #484 in Books > Computers & Technology > Networking & Cloud Computing > Network Security
I bought this book to see how it would work as a textbook for a college course, as with many textbooks from Course Technology. My impression is that it can be used in a graduate level, but would fit more to field practioners who already have enough networking and systems knowledge. Eachh chapter lists many tools (almost as laundry-list like) with brief descriptions and screen shots, but not enough detail for those who want to learn more about them. Most chapters (not all) provide Hands-On projects but most of those projects stay in superficial level, asking to download toolX and click menuY to capture trafficZ, but void with indepth analysis.However, this book can work well as a reference book for network forensic analyst. Since there are not yet many good college textbooks on Network Forensics (AFAIK at the time of writing), this book is still worthwhile to have as a reference.
Was looking for a good book with technical quality and falcilidade understanding. I found everything he sought, I am super satisfied. Shipping very fast.Estava em busca de um bom livro, com qualidade técnica e falcilidade de entendimento. Encontrei tudo que buscava, estou super satisfeito. Frete muito rápido.
We will not be able to stop cyber crime, but prevention and knowledge might mitigate the harmfull effects of it. To fully understand the risks and treats, you should read all volumes. But networks are a good start. And remember that an attack is not always comming from outside. Logging is key for a good investigation.
it was very good and nice quality. it would be help me a lot in my education. the dealer who send me this book is maintain a very good qulity
If you have interest on computer security you better to read this book.
Computer Forensics: Investigating Network Intrusions and Cyber Crime (EC-Council Press) Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crime Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare Hacking: How to Computer Hack: An Ultimate Beginner's Guide to Hacking (Programming, Penetration Testing, Network Security) (Cyber Hacking with Virus, Malware and Trojan Testing) Investigating Eating Disorders (Anorexia, Bulimia, and Binge Eating): Real Facts for Real Lives (Investigating Diseases) Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Extrusion Detection: Security Monitoring for Internal Intrusions True Crime: Deadly Serial Killers And Grisly Murder Stories From The Last 100 Years: True Crime Stories From The Past (Serial Killers True Crime) True Crime: The Worlds Weirdest And Most Vicious Killers Of All Time: True Crime Stories Of The Sick Minded Killers (Serial Killers True Crime Book 2) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Cyber Crime and Digital Evidence: Materials and Cases Criminal Procedure: Investigating Crime, 5th (American Casebook Series) Network Service Investment Guide: Maximizing ROI in Uncertain Times (Networking Council) Network Forensics: Tracking Hackers through Cyberspace More Forensics and Fiction: Crime Writers' Morbidly Curious Questions Expertly Answered (Marder and Mayhem) Forensics and Fiction: Clever, Intriguing, and Downright Odd Questions from Crime Writers Cyber Law: Software and Computer Networks (Litigator Series)