Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Studies

Book Review: Tourists In Space: A Practical Guide, T. D. Oswalt Aug 2008

Book Review: Tourists In Space: A Practical Guide, T. D. Oswalt

Publications

This document is Dr. Oswalt’s review of Tourists in Space : a Practical Guide by Erik Seedhouse. Springer/Praxis, 2008 314p, 9780387746432 $34.95


On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler Mar 2008

On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.


On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler Mar 2008

On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.