Mastering Windows Network Forensics and Investigation
(Sprache: Englisch)
Details the techniques needed to thoroughly investigate, analyze, and document a criminal act on a Windows computer or network, including step-by-step coverage of how to fully investigate a Windows intrusion incident Focuses on investigating criminal...
Leider schon ausverkauft
versandkostenfrei
Buch (Kartoniert)
48.90 €
Produktdetails
Produktinformationen zu „Mastering Windows Network Forensics and Investigation “
Klappentext zu „Mastering Windows Network Forensics and Investigation “
Details the techniques needed to thoroughly investigate, analyze, and document a criminal act on a Windows computer or network, including step-by-step coverage of how to fully investigate a Windows intrusion incident Focuses on investigating criminal activity rather than inappropriate use of company networks and systems Aimed at law enforcement personnel, prosecutors, and corporate investigators tasked with the investigation and prosecution of high technology crime Also covers the emerging field of "live forensics," in which investigators access live data on a computer, server, or network as opposed to performing investigations on unplugged machines or data files, since valuable evidence may be lost once the machine is unplugged
Inhaltsverzeichnis zu „Mastering Windows Network Forensics and Investigation “
IntroductionPart 1: Understanding and Exploiting Windows Networks
Chapter 1: Network Investigation Overview
Chapter 2: The Microsoft Network Structure
Chapter 3: Beyond the Windows GUI
Chapter 4: Windows Password Issues
Chapter 5: Windows Ports and Services
Part 2: Analyzing the Computer
Chapter 6: Live-Analysis Techniques
Chapter 7: Windows File Systems
Chapter 8: The Registry Structure
Chapter 9: Registry Evidence
Chapter 10: Tool Analysis
Part 3: Analyzing the Logs
Chapter 11: Text-Based Logs
Chapter 12: Windows Event Logs
Chapter 13: Logon and Account Logon Events
Chapter 14: Other Audit Events
Chapter 15: Forensic Analysis of Event Logs
Chapter 16: Presenting the Results
Appendix A: The Bottom Line
Index
Autoren-Porträt von Steve Bunting, Steven J. Anson
Steve Anson , CISSP, MCSE, is a special agent with the Pentagon's Defense Criminal Investigative Service. He has a master's degree in computer science as well as numerous industry certifications. As a former contract instructor for the FBI, he has taught hundreds of veteran federal agents, state and local police officers, and intelligence agency employees techniques for conducting computerintrusion investigations. He also founded and supervised a local police department computer crime and information services unit and served as a task force agent for the FBI. He has conducted investigations involving large-scale computer intrusions, counterterrorism, crimes against children, and many other offenses involving the substantive use of computers.Steve Bunting is a captain with the University of Delaware Police Department, where he is responsible for computer forensics, video forensics, and investigations involving computers. He has more than thirty years experience in law enforcement, and his background in computer forensics is extensive. He is a Certified Computer Forensics Technician (CCFT) and an EnCase Certified Examiner (EnCE). He was the recipient of the 2002 Guidance Software Certified Examiner Award of Excellence. He has a bachelor's degree in applied professions/business management from Wilmington College and a computer applications certificate in network environments from the University of Delaware. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, including extortion, homicide, embezzlement, child exploitation, intellectual property theft, and unlawful intrusions into computer systems. He has testified in court on numerous occasions as a computer forensics expert. He has taught computer forensics for Guidance Software, makers of EnCase, and taught as a lead instructor at all course levels. He has been a presenter at several seminars and workshops, is the author of numerous white papers, and
... mehr
is the primary author of the book EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide , which was published by Sybex in early 2006. You can reach him at sbunting@udel.edu.
... weniger
Bibliographische Angaben
- Autoren: Steve Bunting , Steven J. Anson
- 2007, 640 Seiten, Maße: 18,8 x 23,4 cm, Kartoniert (TB), Englisch
- Verlag: Wiley & Sons
- ISBN-10: 0470097620
- ISBN-13: 9780470097625
Sprache:
Englisch
Kommentar zu "Mastering Windows Network Forensics and Investigation"
0 Gebrauchte Artikel zu „Mastering Windows Network Forensics and Investigation“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Mastering Windows Network Forensics and Investigation".
Kommentar verfassen