Cargando…

Mastering Windows network forensics and investigation.

An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate inv...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Anson, Steve, Bunting, Steve, Johnson, Ryan, Pearson, Scott
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn795119901
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 120611s2012 nju o 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d IDEBK  |d OCLCQ  |d OCLCA  |d DEBSZ  |d OCLCF  |d OCLCQ  |d COO  |d DEBBG  |d OCLCQ  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCA  |d ICG  |d OCLCA  |d OCLCQ  |d DKC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 817087151 
020 |a 9781118226148  |q (electronic bk.) 
020 |a 1118226143  |q (electronic bk.) 
020 |a 9781118236086  |q (electronic bk.) 
020 |a 1118236084  |q (electronic bk.) 
020 |a 9781118264119  |q (electronic bk.) 
020 |a 1118264118  |q (electronic bk.) 
020 |a 1280685328 
020 |a 9781280685323 
020 |z 9781118163825 
020 |z 1118163826 
029 1 |a AU@  |b 000055815208 
029 1 |a DEBBG  |b BV041910919 
029 1 |a DEBBG  |b BV044159734 
029 1 |a DEBSZ  |b 397178816 
035 |a (OCoLC)795119901  |z (OCoLC)817087151 
050 4 |a HV8079.C65  |b A57 2012 
072 7 |a LAW  |x 041000  |2 bisacsh 
082 0 4 |a 363.25968  |2 23 
049 |a UAMI 
245 0 0 |a Mastering Windows network forensics and investigation. 
260 |a Hoboken, N.J. :  |b Wiley,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Previous ed. by Steve Anson, Steve Bunting in 2007. 
500 |a Includes index. 
505 0 |a Mastering Windows® Network Forensics and Investigation; Contents; Introduction; Part 1: Understanding and Exploiting Windows Networks; Chapter 1: Network Investigation Overview; Performing the Initial Vetting; Meeting with the Victim Organization; Collecting the Evidence; Analyzing the Evidence; Analyzing the Suspect's Computers; Recognizing the Investigative Challenges of Microsoft Networks; The Bottom Line; Chapter 2: The Microsoft Network Structure; Connecting Computers; Windows Domains; Users and Groups; Permissions; Example Hack; The Bottom Line; Chapter 3: Beyond the Windows GUI. 
505 8 |a Understanding Programs, Processes, and ThreadsRedirecting Process Flow; Maintaining Order Using Privilege Modes; Using Rootkits; The Bottom Line; Chapter 4: Windows Password Issues; Understanding Windows Password Storage; Cracking Windows Passwords Stored on Running Systems; Exploring Windows Authentication Mechanisms; Sniffing and Cracking Windows Authentication Exchanges; Cracking Offline Passwords; The Bottom Line; Chapter 5: Windows Ports and Services; Understanding Ports; Using Ports as Evidence; Understanding Windows Services; The Bottom Line; Part 2: Analyzing the Computer. 
505 8 |a Chapter 6: Live-Analysis TechniquesFinding Evidence in Memory; Creating a Windows Live-Analysis Toolkit; Monitoring Communication with the Victim Box; Scanning the Victim System; The Bottom Line; Chapter 7: Windows Filesystems; Filesystems vs. Operating Systems; Understanding FAT Filesystems; Understanding NTFS Filesystems; Dealing with Alternate Data Streams; The exFAT Filesystem; The Bottom Line; Chapter 8: The Registry Structure; Understanding Registry Concepts; Performing Registry Research; Viewing the Registry with Forensic Tools; Using EnCase to View the Registry. 
505 8 |a Using AccessData's Registry ViewerOther Tools; The Bottom Line; Chapter 9: Registry Evidence; Finding Information in the Software Key; Exploring Windows Security, Action Center, and Firewall Settings; Analyzing Restore Point Registry Settings; Windows XP Restore Point Content; Analyzing Volume Shadow Copies for Registry Settings; Exploring Security Identifiers; Investigating User Activity; Extracting LSA Secrets; Discovering IP Addresses; Compensating for Time Zone Offsets; Determining the Startup Locations; The Bottom Line; Chapter 10: Introduction to Malware. 
505 8 |a Understanding the Purpose of Malware AnalysisMalware Analysis Tools and Techniques; The Bottom Line; Part 3: Analyzing the Logs; Chapter 11: Text-Based Logs; Parsing IIS Logs; Parsing FTP Logs; Parsing DHCP Server Logs; Parsing Windows Firewall Logs; Using Splunk; The Bottom Line; Chapter 12: Windows Event Logs; Understanding the Event Logs; Using Event Viewer; Searching with Event Viewer; The Bottom Line; Chapter 13: Logon and Account Logon Events; Begin at the Beginning; The Bottom Line; Chapter 14: Other Audit Events; The Exploitation of a Network; Examining System Log Entries; Examining Application Log Entries. 
520 |a An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or networkPlaces a special. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Sécurité informatique. 
650 7 |a LAW  |x Forensic Science.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Anson, Steve. 
700 1 |a Bunting, Steve. 
700 1 |a Johnson, Ryan. 
700 1 |a Pearson, Scott. 
758 |i has work:  |a Mastering Windows network forensics and investigation (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCG6bQbkTwxhtBVCW3W6DRq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Mastering Windows network forensics and investigation.  |d Hoboken, N.J. : Wiley, 2012  |z 9781118163825  |w (OCoLC)768072256 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=818114  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL818114 
938 |a EBSCOhost  |b EBSC  |n 459447 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 366226 
938 |a YBP Library Services  |b YANK  |n 7667423 
938 |a YBP Library Services  |b YANK  |n 12671357 
994 |a 92  |b IZTAP