Mastering Windows network forensics and investigation
Contributor(s): Anson, Steve | Bunting, Steve | Johnson, Ryan | Pearson, Scott.
Material type: TextPublisher: Hoboken, N.J. : Wiley, 2012General Notes: Includes index; Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page; Previous ed. by Steve Anson, Steve Bunting in 2007.Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781118226148 (electronic bk.); 9781118236086 (electronic bk.); 9781118721612.Subject(s): Microsoft Windows (Computer file) | Computer crimes -- Investigation | Computer securityGenre/Form: Electronic books. DDC classification: 363.25968 Online resources: Access full-text materials at no charge:Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
E-book | Davenport Library e-book | E-book | 363.25968 (Browse shelf(Opens below)) | Not For Loan | mq598271 |
Browsing Davenport Library shelves, Shelving location: e-book , Collection: E-book Close shelf browser (Hides shelf browser)
Includes index.
Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.
Previous ed. by Steve Anson, Steve Bunting in 2007.
Introduction -- Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization -- Appendix A: The bottom line -- Appendix B: Test environments
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special.
Description based on print version record.
There are no comments on this title.