TY - BOOK ID - 88944908 TI - Windows forensic analysis PY - 2007 SN - 9781597491563 9780080556444 0080556442 159749156X 1281112658 9781281112651 9786611112653 6611112650 PB - Burlington, MA Syngress Pub. DB - UniCat KW - Computer architecture. Operating systems KW - MS Windows KW - computercriminaliteit KW - Computer crimes KW - Computer networks KW - Internet KW - Computer security. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Computer network security KW - Network security, Computer KW - Security of computer networks KW - Computer security KW - Computers and crime KW - Cyber crimes KW - Cybercrimes KW - Electronic crimes (Computer crimes) KW - Internet crimes KW - Crime KW - Privacy, Right of KW - Investigation KW - Methodology. KW - Security measures. KW - Protection KW - Security measures KW - Microsoft Windows (Computer file) KW - Windows (Computer file) KW - Chicago (Computer file) KW - Microsoft Windows 95 KW - Windows 95 KW - Microsoft Windows CE KW - Windows CE KW - Pegasus (Computer file) KW - Windows for workgroups KW - Microsoft Windows for workgroups KW - Windows 98 KW - Microsoft Windows 98 KW - Windows 2000 professional KW - Windows 2000 KW - Microsoft Windows 2000 KW - Microsoft Windows Me millennium edition KW - Windows Me KW - Microsoft Windows XP (Computer file) KW - Windows XP KW - Microsoft Windows Vista KW - Windows Vista KW - Microsoft Windows 7 KW - Windows 7 KW - Windows 8 KW - Windows 10 UR - https://www.unicat.be/uniCat?func=search&query=sysid:88944908 AB - The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who ER -