Mastering Windows Network Forensic and Investigation
Samenvatting
Learn How to Conduct a Complete Computer Forensic Investigation
This professional guide teaches law enforcement personnel, prosecutors, and corporate investigators how to investigate crimes involving Windows computers and Windows networks. A top team of forensic experts details how and why Windows networks are targeted, shows you how to analyze computers and computer logs, explains chain of custody, and covers such tricky topics as how to gather accurate testimony from employees in politically charged corporate settings.
From recognizing high-tech criminal activity to presenting evidence in a way that juries and judges understand, this book thoroughly covers the range of skills, standards, and step-by-step procedures you need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.
Coverage includes:
- Responding to a reported computer intrusion
- Understanding how attackers exploit Windows networks
- Deciphering Windows ports, services, file systems, and the registry
- Examining suspects' computers and entire networks
- Analyzing event logs and data using live analysis techniques
- Exploring new complexities from cloud computing and virtualization
- Investigate Computer Crimes in Windows Environments
- Fully Updated for Windows Server 2008 and Windows 7
- Discover How to Locate and Analyze an Attacker's Tools
- Learn Detailed Windows Event Log Analysis
Specificaties
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Part 1: Understanding and Exploiting Windows Networks
1. Network Investigation Overview
2. The Microsoft Network Structure
3. Beyond the Windows GUI
4. Windows Password Issues
5. Windows Ports and Services
Part 2: Analyzing the Computer
6. Live-Analysis Techniques
7. Windows Filesystems
8. The Registry Structure
9. Registry Evidence
10. Introduction to Malware
Part 3: Analyzing the Logs
11. Text-Based Logs
12. Windows Event Logs
13. Logon and Account Logon Events
14. Other Audit Events
15. Forensic Analysis of Event Logs
Part 4: Results, the Cloud, and Virtualization
16. Presenting the Results
17. The Challenges of Cloud Computing and Virtualization
Part 5: Appendices
Appendix A: The Bottom Line
Appendix B: Test Environments
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- cadeauboeken
- computer en informatica
- economie
- filosofie
- flora en fauna
- geneeskunde
- geschiedenis
- gezondheid
- jeugd
- juridisch
- koken en eten
- kunst en cultuur
- literatuur en romans
- mens en maatschappij
- naslagwerken
- non-fictie informatief/professioneel
- paramedisch
- psychologie
- reizen
- religie
- schoolboeken
- spiritualiteit
- sport, hobby, lifestyle
- thrillers en spanning
- wetenschap en techniek
- woordenboeken en taal