Fr. 80.00

Mastering Windows Network Forensics and Investigation

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Steve Anson , CISSP, EnCE, is the cofounder of Forward Discovery. He has previously served as a police officer, FBI High Tech Crimes Task Force agent, Special Agent with the U.S. DoD, and an instructor with the U.S. State Department Antiterrorism Assistance Program (ATA). He has trained hundreds of law enforcement officers around the world in techniques of digital forensics and investigation. Steve Bunting, EnCE, CCFT, has over 35 years of experience in law enforcement, and his background in computer forensics is extensive. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, as well as testified in court as a computer forensics expert. He has taught computer forensics courses for Guidance Software and is currently a Senior Forensic Consultant with Forward Discovery. Ryan Johnson, DFCP, CFCE, EnCE, SCERS, is a Senior Forensic Consultant with Forward Discovery. He was a digital forensics examiner for the Durham, NC, police and a Media Exploitation Analyst with the U.S. Army. He is an instructor and developer with the ATA. Scott Pearson has trained law enforcement entities, military personnel, and network/system administrators in more than 20 countries for the ATA. He is also a certifying Instructor on the Cellebrite UFED Logical and Physical Analyzer Mobile Device Forensics tool and has served as an instructor for the DoD Computer Investigations Training Academy. Klappentext An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals.* Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network* Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response* Walks you through ways to present technically complicated material in simple terms that will hold up in court* Features content fully updated for Windows Server 2008 R2 and Windows 7* Covers the emerging field of Windows Mobile forensicsAlso included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes. Zusammenfassung An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. Inhaltsverzeichnis Introduction xvii Part 1 Understanding and Exploiting Windows Networks 1 Chapter 1 Network Investigation Overview 3 Performing the Initial Vetting 3 Meeting with the Victim Organization 5 Understanding the Victim Network Information 6 Understanding the Incident 8 Identifying and Preserving Evidence 9 Establishing Expectations and Responsibilities 11 Collecting the Evidence 12 Analyzing the Evidence 15 Analyzing the Suspect's Computers 18 Recognizing the Investigative Challenges of Microsoft Networks 21 The Bottom Line 22 Chapter 2 The Microsoft Network Structure 25 Connecting Computers 25 Windows Domains 27 Interconnecting Domains 29 Organizational Units 34 Users and Groups 35 Types of Accounts 36 Groups 40 Permissions 44 File Permissions 45 Share Permissions 48 Reconciling Share and File Permissions 50 Example Hack 52 The Bottom Line 61 Chap...

List of contents

Introduction xvii
 
Part 1 Understanding and Exploiting Windows Networks 1
 
Chapter 1 Network Investigation Overview 3
 
Chapter 2 The Microsoft Network Structure 25
 
Chapter 3 Beyond the Windows GUI 63
 
Chapter 4 Windows Password Issues 85
 
Chapter 5 Windows Ports and Services 137
 
Part 2 Analyzing the Computer 157
 
Chapter 6 Live-Analysis Techniques 159
 
Chapter 7 Windows Filesystems 179
 
Chapter 8 The Registry Structure 215
 
Chapter 9 Registry Evidence 257
 
Chapter 10 Introduction to Malware 325
 
Part 3 Analyzing the Logs 349
 
Chapter 11 Text-Based Logs 351
 
Chapter 12 Windows Event Logs 381
 
Chapter 13 Logon and Account Logon Events 419
 
Chapter 14 Other Audit Events 463
 
Chapter 15 Forensic Analysis of Event Logs 505
 

Part 4 Results, the Cloud, and Virtualization 537
 
Chapter 16 Presenting the Results 539
 
Chapter 17 The Challenges of Cloud Computing and Virtualization 565
 
Part 5 Appendices 597
 
Appendix A The Bottom Line 599
 
Appendix B Test Environments 633
 
Index 647

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.