Cargando…

Investigating Windows Systems.

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Inves...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carvey, Harlan A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Elsevier Ltd. : Academic Press, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1048895861
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 180820s2018 enk o 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OPELS  |d OCLCF  |d NLE  |d IDB  |d UKMGB  |d OTZ  |d U3W  |d LVT  |d COO  |d D6H  |d C6I  |d OCLCQ  |d S2H  |d OCLCO  |d NLW  |d OCLCQ  |d OCLCO  |d COM  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBB8G1925  |2 bnb 
016 7 |a 019030602  |2 Uk 
019 |a 1049279954 
020 |a 9780128114162  |q (electronic bk.) 
020 |a 0128114169  |q (electronic bk.) 
020 |z 9780128114155 
020 |z 0128114150 
029 1 |a UKMGB  |b 019030602 
035 |a (OCoLC)1048895861  |z (OCoLC)1049279954 
037 |a 9780128114162  |b Ingram Content Group 
050 4 |a QA76.9.B32 
072 7 |a COM  |x 000000  |2 bisacsh 
072 7 |a ULD  |2 bicssc 
082 0 4 |a 005.8/6  |2 23 
049 |a UAMI 
100 1 |a Carvey, Harlan A.,  |e author. 
245 1 0 |a Investigating Windows Systems. 
264 1 |a London :  |b Elsevier Ltd. :  |b Academic Press,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed August 21, 2018). 
520 |a Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response. 
505 0 |a Front Cover; Investigating Windows Systems; Copyright Page; Contents; About the Author; Preface; Intended Audience; Book Organization; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Acknowledgments; 1 The Analysis Process; Introduction; The Analysis Process; Goals; Analysis Plan; Reporting; Lessons Learned; Modifying the Analysis Process, Based on Lessons Learned; Sharing; The Rest of This Book; 2 Finding Malware; Introduction; Finding Malware-Windows XP; Image Format; Analysis Goal; Image Survey; Constructing a Timeline; System Time Changes; Documenting the Malware; Analysis Summary 
505 8 |a Analysis PointsFinding Malware-Windows 7; Analysis Goal; Image Survey; Constructing a Timeline; USB Device Analysis; Analysis Summary; Analysis Points; Final Words; 3 User Activity; Introduction; CFReDS Hacking Case Image; Analysis Goals; Analysis Plan; Timeline; Additional Data; Summary; Lessons Learned; Data Theft; Analysis Goals; Analysis Plan; Connected Devices; Data Theft; Outlook PST File; Other Data Sources; Summary; Lessons Learned; Joe's PC; Analysis Goals; Analysis Plan; Analysis; Viewing ThumbCache Database Contents; Sufficiency; Summary; Lessons Learned; 4 Web Server Compromise 
505 8 |a IntroductionWindows 2008 Web Server; Analysis Goals; Analysis Plan; Data Extraction; Analysis; Web Server Logs; Findings; Summary; 5 Setting Up A Testing Environment; Introduction; Setting Up A Testing Environment; Configuration; Testing and Documentation; File System Tunneling; Deleting Files; Volume Shadow Copies; Final Words; Index; Back Cover 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic data processing  |x Backup processing alternatives. 
650 0 |a Data recovery (Computer science) 
650 6 |a Sauvegarde (Informatique) 
650 6 |a Récupération des données (Informatique) 
650 7 |a COMPUTER SCIENCE  |x General.  |2 bisacsh 
650 7 |a Data recovery (Computer science)  |2 fast 
650 7 |a Electronic data processing  |x Backup processing alternatives  |2 fast 
776 0 8 |i Print version:  |z 0128114150  |z 9780128114155  |w (OCoLC)1022772761 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128114162/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5493879 
938 |a EBSCOhost  |b EBSC  |n 1724610 
938 |a YBP Library Services  |b YANK  |n 15659327 
994 |a 92  |b IZTAP