Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, fr
Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks -- Security measures. --- Computer security. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Investigation --- Methodology --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10
Choose an application
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who
Computer architecture. Operating systems --- MS Windows --- computercriminaliteit --- Computer crimes --- Computer networks --- Internet --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Investigation --- Methodology. --- Security measures. --- Protection --- Security measures --- Microsoft Windows (Computer file) --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10
Choose an application
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting. Complete coverage and examples of Windows 8 systems Contains lessons from the field, case studies, and war stories Companion online toolkit material, including electronic printable checklists, cheat sheets, custom tools, and walk-throughs.
Choose an application
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis. Named a Best Digital Forensics Book by InfoSec Reviews Packed with real-world examples using freely available open source tools Provides a deep explanation and understanding of the Windows Registry—perhaps the least understood and employed source of information within Windows systems Includes a companion website that contains the code and author-created tools discussed in the book Features updated, current tools and techniques Contains completely updated content throughout, with all new coverage of the latest versions of Windows
Computer. Automation --- Operating systems (Computers) --- Computer crimes --- Computer networks --- Computer security. --- Investigation --- Methodology. --- Security measures. --- Microsoft Windows (Computer file)
Choose an application
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.
Choose an application
The technology covered in this book is not just the Perl programming language. Perl is simply used to automate tasks that would otherwise be time-consuming, tedious and the results would be subject to errors. Perl is used to crack the Windows, to peek inside and leverage the underlying technology to accomplish tasks that security professionals face every day. This book isnt just a practical guide to performing real-world tasks; rather this book provides real, working code to the reader, illustrating techniques they can use to extract information from Windows systems. This approach allows the reader to get up and running much quicker. However, rather than being simply a collection of code, this book is a stepping off point into working more efficiently and getting the job done. *Perl is the third most commonly used programming language in the world *Helps security professionals in updating settings on a remote server several cities away, collecting data for a report to management, and more *The companion Web site for the book contains dozens of scripts the reader can download and use today.
Choose an application
Choose an application
Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newest version of Windows, Windows 7. Windows Forensic Analysis Toolkit, 3e, covers live and postmortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline w
Computer crimes - Investigation - United States - Methodology. --- Computer crimes -- Investigation -- United States -- Methodology. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer security. --- Internet - Security measures. --- Internet -- Security measures. --- Microsoft Windows (Computer file) -- Security measures. --- Computer crimes --- Computer networks --- Internet --- Computer security --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Methodology --- Investigation --- Security measures --- Methodology. --- Security measures. --- Microsoft Windows (Computer file) --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Protection --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10
Choose an application
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin
Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Computer security. --- Criminal investigation. --- Criminal procedure. --- Electronic evidence. --- Forensic sciences --- Electronics in criminal investigation. --- Computer crimes --- Electronic discovery (Law) --- Evidence, Criminal. --- Data processing. --- Investigation. --- Information Technology --- General and Others --- Criminal evidence --- Criminal investigation --- Criminal procedure --- Evidence (Law) --- Reasonable doubt --- Computer discovery (Law) --- Cyber discovery (Law) --- Cyberdiscovery (Law) --- Digital discovery (Law) --- E-discovery (Law) --- Discovery (Law) --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Electronic bugging --- Electronic listening devices --- Criminalistics --- Forensic science --- Science
Choose an application
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners Details
Computer crimes - Investigation. --- Computer crimes --Investigation. --- Forensic sciences. --- Open source software. --- Computer crimes --- Open source software --- Forensic sciences --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Investigation --- Investigation. --- Information Technology --- General and Others --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics
Listing 1 - 10 of 15 | << page >> |
Sort by
|