Syndetics cover image
Image from Syndetics

Mastering Windows network forensics and investigation

Contributor(s): Anson, Steve | Bunting, Steve | Johnson, Ryan | Pearson, Scott.
Material type: TextTextPublisher: Hoboken, N.J. : Wiley, 2012General Notes: Includes index; Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page; Previous ed. by Steve Anson, Steve Bunting in 2007.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781118226148 (electronic bk.); 9781118236086 (electronic bk.); 9781118721612.Subject(s): Microsoft Windows (Computer file) | Computer crimes -- Investigation | Computer securityGenre/Form: Electronic books. DDC classification: 363.25968 Online resources: Access full-text materials at no charge:
Contents:
Introduction -- Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization -- Appendix A: The bottom line -- Appendix B: Test environments
Summary: An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
E-book Davenport Library e-book E-book 363.25968 (Browse shelf(Opens below)) Not For Loan mq598271

Includes index.

Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.

Previous ed. by Steve Anson, Steve Bunting in 2007.

Introduction -- Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization -- Appendix A: The bottom line -- Appendix B: Test environments

An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special.

Description based on print version record.

There are no comments on this title.

to post a comment.

Powered by Koha