Warehouse Stock Clearance Sale

Grab a bargain today!


Internet Forensics
By

Rating

Product Description
Product Details

Table of Contents

Preface 1. Introduction What Is Internet Forensics? The Seamy Underbelly of the Internet Pulling Back the Curtain Taking Back Our Internet Protecting Your Privacy Before You Begin A Network Neighborhood Watch 2. Names and Numbers Addresses on the Internet Internet Address Tools DNS Record Manipulation An Example-Dissecting a Spam Network 3. Email Message Headers Forged Headers Forging Your Own Headers Tracking the Spammer Viruses, Worms, and Spam Message Attachments Message Content Is It Really Spam? 4. Obfuscation Anatomy of a URL IP Addresses in URLs Usernames in URLs Encoding the Entire Message Similar Domain Names Making a Form Look Like a URL Bait and Switch-URL Redirection JavaScript Browsers and Obfuscation 5. Web Sites Capturing Web Pages Viewing HTML Source Comparing Pages Non-Interactive Downloads Using wget Mapping Out the Entire Web Site Hidden Directories In-Depth Example-Directory Listings Dynamic Web Pages Filling Out Forms In-Depth Example-Server-Side Database Opening the Black Box 6. Web Servers Viewing HTTP Headers What Can Headers Tell Us? Cookies Redirection Web Server Statistics Controlling HTTP Headers A Little Bit of Everything 7. Web Browsers What Your Browser Reveals Apache Web Server Logging Server Log Analysis Protecting Your Privacy 8. File Contents Word Document Metadata U.K. Government Dossier on Iraq Document Forgery Redaction of Sensitive Information 9. People and Places Geographic Location Time Zone Language Expertise Criminal or Victim? Hardware and Software 10. Patterns of Activity Signatures Searching with Signatures Problems with Simple Signatures Full Text Comparison Using Internet Search Engines for Patterns 11. Case Studies Case Study 1: Tidball Case Study 2: Spam Networks 12. Taking Action What Is Being Done to Tackle Internet Fraud? What You Can Do to Help Getting in Over Your Head Vision of a Community Response Index

About the Author

Robert Jones runs Craic Computing, a small bioinformatics company in Seattle that provides advanced software and data analysis services to the biotechnology industry. He was a bench molecular biologist for many years before programming got the better of him.

Reviews

""Internet Forensics" compiles a lot of information that has typically been available only by word of mouth or bitter experience. The average user will find themselves able to apply its techniques, and even if they choose not to, they will gain a deep understanding of how the Internet works. The book's clear style and firm grounding in reality make it an excellent read." - Gavin Inglis, news@UK, June 2006

Ask a Question About this Product More...
 
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Internet Forensics: Using Digital Evidence to Solve Computer Crime on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.

Back to top