|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn795119901 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120611s2012 nju o 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d IDEBK
|d OCLCQ
|d OCLCA
|d DEBSZ
|d OCLCF
|d OCLCQ
|d COO
|d DEBBG
|d OCLCQ
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCO
|d OCLCA
|d ICG
|d OCLCA
|d OCLCQ
|d DKC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
019 |
|
|
|a 817087151
|
020 |
|
|
|a 9781118226148
|q (electronic bk.)
|
020 |
|
|
|a 1118226143
|q (electronic bk.)
|
020 |
|
|
|a 9781118236086
|q (electronic bk.)
|
020 |
|
|
|a 1118236084
|q (electronic bk.)
|
020 |
|
|
|a 9781118264119
|q (electronic bk.)
|
020 |
|
|
|a 1118264118
|q (electronic bk.)
|
020 |
|
|
|a 1280685328
|
020 |
|
|
|a 9781280685323
|
020 |
|
|
|z 9781118163825
|
020 |
|
|
|z 1118163826
|
029 |
1 |
|
|a AU@
|b 000055815208
|
029 |
1 |
|
|a DEBBG
|b BV041910919
|
029 |
1 |
|
|a DEBBG
|b BV044159734
|
029 |
1 |
|
|a DEBSZ
|b 397178816
|
035 |
|
|
|a (OCoLC)795119901
|z (OCoLC)817087151
|
050 |
|
4 |
|a HV8079.C65
|b A57 2012
|
072 |
|
7 |
|a LAW
|x 041000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.25968
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Mastering Windows network forensics and investigation.
|
260 |
|
|
|a Hoboken, N.J. :
|b Wiley,
|c 2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Previous ed. by Steve Anson, Steve Bunting in 2007.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Mastering Windows® Network Forensics and Investigation; Contents; Introduction; Part 1: Understanding and Exploiting Windows Networks; Chapter 1: Network Investigation Overview; Performing the Initial Vetting; Meeting with the Victim Organization; Collecting the Evidence; Analyzing the Evidence; Analyzing the Suspect's Computers; Recognizing the Investigative Challenges of Microsoft Networks; The Bottom Line; Chapter 2: The Microsoft Network Structure; Connecting Computers; Windows Domains; Users and Groups; Permissions; Example Hack; The Bottom Line; Chapter 3: Beyond the Windows GUI.
|
505 |
8 |
|
|a Understanding Programs, Processes, and ThreadsRedirecting Process Flow; Maintaining Order Using Privilege Modes; Using Rootkits; The Bottom Line; Chapter 4: Windows Password Issues; Understanding Windows Password Storage; Cracking Windows Passwords Stored on Running Systems; Exploring Windows Authentication Mechanisms; Sniffing and Cracking Windows Authentication Exchanges; Cracking Offline Passwords; The Bottom Line; Chapter 5: Windows Ports and Services; Understanding Ports; Using Ports as Evidence; Understanding Windows Services; The Bottom Line; Part 2: Analyzing the Computer.
|
505 |
8 |
|
|a Chapter 6: Live-Analysis TechniquesFinding Evidence in Memory; Creating a Windows Live-Analysis Toolkit; Monitoring Communication with the Victim Box; Scanning the Victim System; The Bottom Line; Chapter 7: Windows Filesystems; Filesystems vs. Operating Systems; Understanding FAT Filesystems; Understanding NTFS Filesystems; Dealing with Alternate Data Streams; The exFAT Filesystem; The Bottom Line; Chapter 8: The Registry Structure; Understanding Registry Concepts; Performing Registry Research; Viewing the Registry with Forensic Tools; Using EnCase to View the Registry.
|
505 |
8 |
|
|a Using AccessData's Registry ViewerOther Tools; The Bottom Line; Chapter 9: Registry Evidence; Finding Information in the Software Key; Exploring Windows Security, Action Center, and Firewall Settings; Analyzing Restore Point Registry Settings; Windows XP Restore Point Content; Analyzing Volume Shadow Copies for Registry Settings; Exploring Security Identifiers; Investigating User Activity; Extracting LSA Secrets; Discovering IP Addresses; Compensating for Time Zone Offsets; Determining the Startup Locations; The Bottom Line; Chapter 10: Introduction to Malware.
|
505 |
8 |
|
|a Understanding the Purpose of Malware AnalysisMalware Analysis Tools and Techniques; The Bottom Line; Part 3: Analyzing the Logs; Chapter 11: Text-Based Logs; Parsing IIS Logs; Parsing FTP Logs; Parsing DHCP Server Logs; Parsing Windows Firewall Logs; Using Splunk; The Bottom Line; Chapter 12: Windows Event Logs; Understanding the Event Logs; Using Event Viewer; Searching with Event Viewer; The Bottom Line; Chapter 13: Logon and Account Logon Events; Begin at the Beginning; The Bottom Line; Chapter 14: Other Audit Events; The Exploitation of a Network; Examining System Log Entries; Examining Application Log Entries.
|
520 |
|
|
|a An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a LAW
|x Forensic Science.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Anson, Steve.
|
700 |
1 |
|
|a Bunting, Steve.
|
700 |
1 |
|
|a Johnson, Ryan.
|
700 |
1 |
|
|a Pearson, Scott.
|
758 |
|
|
|i has work:
|a Mastering Windows network forensics and investigation (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCG6bQbkTwxhtBVCW3W6DRq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Mastering Windows network forensics and investigation.
|d Hoboken, N.J. : Wiley, 2012
|z 9781118163825
|w (OCoLC)768072256
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=818114
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL818114
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 459447
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 366226
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7667423
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12671357
|
994 |
|
|
|a 92
|b IZTAP
|