Books written by Jonathan Ham

  • Network Forensics: Tracking Hackers through Cyberspace

    ... dynamic | 246 | Et0/0 d0d0.fdc4.0994 | 0002 | static | - | In0/1 ffff.ffff.ffff | 0002 | static broadcast | - | In0/1,Et0/0-7 Total Entries: 8 2. David C. Plummer, “RFC 826—Converting Network Protocol Addresses to 9.2 Switches 337.

  • Network Forensics: Tracking Hackers Through Cyberspace

    Joe Stewart, Director of Malware Research at Dell SecureWorks, wrote, “When Storm Worm runs, it attempts to link up with other infected hosts via peer-to-peer networking. Through this conduit it gets a URL that points to a second-stage ...

  • CISSP Practice Exams, Fifth Edition

    This means an application is just one big pile of code. If you need to change something in this pile, you would need to go through the whole program's logic functions to figure out what your one change is going to break.

  • CISSP Practice Exams, Fourth Edition

    This book is the perfect companion to CISSP All-in-One Exam Guide, Seventh Edition. Designed as an exam-focused self-study aid and resource, CISSP Practice Exams, Fourth Edition, fully covers the eight newly-revised exam domains.

  • CISSP Bundle, Fourth Edition

    Prepare for the 2018 CISSP exam with this up-to-date, money-saving study packageDesigned as a complete self-study program, this collection offers a wide variety of proven, exam-focused resources to use in preparation for the current edition ...

  • CISSP Practice Exams, Fifth Edition

    Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam Guide.