Books written by Sherri Davidoff

  • Network Forensics: Tracking Hackers through Cyberspace

    ... dynamic | 246 | Et0/0 d0d0.fdc4.0994 | 0002 | static | - | In0/1 ffff.ffff.ffff | 0002 | static broadcast | - | In0/1,Et0/0-7 Total Entries: 8 2. David C. Plummer, “RFC 826—Converting Network Protocol Addresses to 9.2 Switches 337.

  • Network Forensics: Tracking Hackers Through Cyberspace

    Joe Stewart, Director of Malware Research at Dell SecureWorks, wrote, “When Storm Worm runs, it attempts to link up with other infected hosts via peer-to-peer networking. Through this conduit it gets a URL that points to a second-stage ...

  • Data Breaches Exposed: Downs, Ups, and How to End Up Better Off

    Sherri Davidoff teaches through storytelling, making this book powerfully accessible and practically useful to everyone from the boardroom to the server closet.

  • Ransomware and Cyber Extortion

    If you haven't faced a ransomware attack yet, count yourself lucky, and get this guide today--so you can prepare, before it's too late.

  • Data Breaches: Crisis and Opportunity

    Crisis and Opportunity Sherri Davidoff. the secret data, particularly since Microsoft's team itself has repeatedly stated that it was not designed for forensics purposes. Secret sources of evidence cannot be vetted by the broader ...

  • 黑客大追踪

    本书共分四大部分十二章, 第1章"实用调查策略", 第2章"技术基础"和第3章"证据获取"属于第一部分, 其中给出了一个取证的方法框架, 并介绍了相关的基础知识;第4章"数据包分析", 第5章 ...