|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn874017518 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
140320s2014 nyua ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d E7B
|d UMI
|d OCLCO
|d DEBBG
|d DEBSZ
|d YDXCP
|d VLB
|d RIV
|d COO
|d OCLCQ
|d YDX
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCQ
|d OCLCF
|d VVB
|d U3W
|d D6H
|d CEF
|d INT
|d OTZ
|d OCLCA
|d OCLCQ
|d AUD
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 880898386
|a 966353441
|a 993682488
|a 1018193036
|a 1304986380
|
020 |
|
|
|a 9780124171749
|
020 |
|
|
|a 0124171745
|
020 |
|
|
|z 9780124171572
|
020 |
|
|
|z 0124171575
|
029 |
1 |
|
|a AU@
|b 000052839809
|
029 |
1 |
|
|a CHBIS
|b 010295226
|
029 |
1 |
|
|a CHVBK
|b 327778407
|
029 |
1 |
|
|a DEBBG
|b BV042032773
|
029 |
1 |
|
|a DEBBG
|b BV042300052
|
029 |
1 |
|
|a DEBSZ
|b 414182464
|
029 |
1 |
|
|a DEBSZ
|b 414273001
|
029 |
1 |
|
|a CHNEW
|b 001011998
|
035 |
|
|
|a (OCoLC)874017518
|z (OCoLC)880898386
|z (OCoLC)966353441
|z (OCoLC)993682488
|z (OCoLC)1018193036
|z (OCoLC)1304986380
|
037 |
|
|
|a CL0500000434
|b Safari Books Online
|
050 |
|
4 |
|a HV8079.C65
|b C3726 2014eb
|
082 |
0 |
4 |
|a 363.25968
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Carvey, Harlan A.,
|e author.
|
245 |
1 |
0 |
|a Windows forensic analysis toolkit :
|b advanced analysis techniques for Windows 8 /
|c Harlan Carvey.
|
250 |
|
|
|a Fourth edition.
|
264 |
|
1 |
|a Rockland :
|b Syngress,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting. Complete coverage and examples of Windows 8 systems Contains lessons from the field, case studies, and war stories Companion online toolkit material, including electronic printable checklists, cheat sheets, custom tools, and walk-throughs.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Front Cover; Windows Forensic Analysis Toolkit; Copyright Page; Contents; Preface; Intended Audience; Organization of This Book; DVD Contents; Acknowledgments; About the Author; About the Technical Editor; 1 Analysis Concepts; Introduction; Analysis concepts; Windows versions; Analysis principles; Goals; Tools versus processes; The tool validation myth-odology; Locard's exchange principle; Avoiding speculation; Direct and indirect artifacts; Least frequency of occurrence; Documentation; Convergence; Virtualization; Setting up an analysis system; Summary; 2 Incident Preparation; Introduction.
|
505 |
8 |
|
|a Being prepared to respondQuestions; The importance of preparation; Logs; Data collection; Training; Business models; Summary; 3 Volume Shadow Copies; Introduction; What are "volume shadow copies"?; Registry keys; Live systems; ProDiscover; F-Response; Acquired images; VHD method; VMWare method; Automating VSC access; ProDiscover; Windows 8; Summary; Reference; 4 File Analysis; Introduction; MFT; File system tunneling; TriForce; Event logs; Windows Event Log; Recycle bin; Prefetch files; Scheduled tasks; Jump lists; Hibernation files; Application files; Antivirus logs; Skype; Apple products.
|
505 |
8 |
|
|a Image filesSummary; References; 5 Registry Analysis; Introduction; Registry analysis; Registry nomenclature; The registry as a log file; USB device analysis; System hive; Services; Bluetooth; Software hive; Application analysis; NetworkList; NetworkCards; Scheduled tasks; User hives; WordWheelQuery; Shellbags; MenuOrder; MUICache; UserAssist; Photos; Virtual PC; TypedPaths; Additional sources; RegIdleBackup; Volume shadow copies; Virtualization; Memory; Tools; Summary; References; 6 Malware Detection; Introduction; Malware Characteristics; Initial infection vector; Propagation mechanism.
|
505 |
8 |
|
|a Persistence mechanismArtifacts; Detecting Malware; Log analysis; Dr. Watson logs; AV scans; AV write ups; Digging deeper; Packed files; Digital signatures; Windows File Protection; Alternate data streams; PE file compile times; Master boot record infectors; Registry analysis; Internet activity; Additional detection mechanisms; Seeded sites; Summary; References; 7 Timeline Analysis; Introduction; Timelines; Data sources; Time formats; Concepts; Benefits; Format; Time; Source; System; User; Description; TLN format; Creating Timelines; File system metadata; Event logs; Windows XP; Windows 7.
|
505 |
8 |
|
|a Prefetch filesRegistry data; Additional sources; Parsing events into a timeline; Thoughts on visualization; Case Study; Summary; 8 Correlating Artifacts; Introduction; How-Tos; Correlating Windows shortcuts to USB devices; Demonstrate user access to files; IE browser analysis; Detecting system time change; Who ran defrag?; Determine data exfiltration; Finding something "new"; Summary; 9 Reporting; Introduction; Goals; Incident triage; Case Notes; Documenting your analysis; Reporting; Format; Executive summary; Body; Background; Analysis; Conclusions; Writing tips; Peer review; Summary; Index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|0 (OCoLC)fst01367862
|
650 |
|
0 |
|a Computer crimes
|x Investigation
|x Methodology.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes
|x Méthodologie.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
776 |
0 |
8 |
|i Print version:
|a Carvey, Harlan A.
|t Windows forensic analysis toolkit.
|b Fourth edition
|z 9780124171572
|w (OCoLC)872701493
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124171572/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10849334
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11719719
|
994 |
|
|
|a 92
|b IZTAP
|