Mastering Windows Network Forensics and Investigation, Second Edition 🔍
Steven Anson; Steve Bunting; Ryan Johnson; Scott Pearson; Safari, an O’Reilly Media Company John Wiley & Sons, Inc.; Wiley-Interscience; Sybex, 2. Auflage, New York, 2012
英语 [en] · PDF · 42.1MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
**An authoritative guide to investigating high-technology crimes**Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals.
* Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network
* Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response
* Walks you through ways to present technically complicated material in simple terms that will hold up in court
* Features content fully updated for Windows Server 2008 R2 and Windows 7
* Covers the emerging field of Windows Mobile forensics
Also included is a classroom support package to ensure academic adoption, __Mastering Windows Network Forensics and Investigation, 2nd Edition__ offers help for investigating high-technology crimes.
备用文件名
lgli/Sybex.Mastering.Windows.Network.Forensics.and.Investigation.2nd.Edition.Jun.2013.pdf
备用文件名
lgrsnf/Sybex.Mastering.Windows.Network.Forensics.and.Investigation.2nd.Edition.Jun.2013.pdf
备用文件名
zlib/Computers/Networking/Steven Anson, Steve Bunting, Ryan Johnson, Scott Pearson/Mastering Windows Network Forensics and Investigation_2159043.pdf
备选标题
Mastering Windows Network Forensics and Investigation, 2nd Edition
备选作者
Steve Anson, Steve Bunting, Scott Pearson, Ryan Johnson
备选作者
Steve Anson; Scott Pearson; Steve Bunting
备用出版商
John Wiley & Sons, Incorporated
备用版本
Sybex serious skills, Second edition., Hoboken, NJ, New Jersey, 2012
备用版本
John Wiley & Sons, Inc. (trade), Hoboken, N.J., 2012
备用版本
United States, United States of America
备用版本
2, PS, 2012
元数据中的注释
0
元数据中的注释
lg1005080
元数据中的注释
{"edition":"2","isbns":["1118163826","9781118163825"],"last_page":696,"publisher":"Sybex"}
元数据中的注释
Includes index.
备用描述
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age. Now you can get the training you need in this comprehensive guide from two seasoned law enforcement professionals. From recognizing high-tech criminal activity and collecting evidence to presenting it in a way that judges and juries can understand, this book covers the range of skills, standards, and step-by-step procedures you'll need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.
<p>The book also covers the emerging field of "live forensics," where investigators examine a system to obtain evidence while it is still running, thus preserving live data that may be lost if the system is shut down. Coverage includes: Responding to a reported computer intrusion, Conducting the initial interview with the victims, Understanding how attackers exploit Windows networks, Deciphering Windows file systems, registries, and more, Analyzing data rapidly using live analysis techniques, Examining suspects' computers, Using EnCase[Registered] for Windows event log analysis, Presenting technically complicated material to juries.</p>
备用描述
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.
备用描述
Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization
备用描述
Annotation The authors provide the techniques that should be employed to thoroughly investigate, analyse, and document a criminal act on a Windows computer or network. Its focus is on investigating criminal activity and not simply inappropriate use of company networks and systems
开源日期
2013-08-05
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:Motrix
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。