Mastering Windows network forensics and investigation / Steve Anson and Steve Bunting.
Material type:
- 9780470097625
- HV 8079.C65 .A57 2007

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC HV 8079.C65 .A57 2007 (Browse shelf(Opens below)) | c.1 | Available | NULIB000008361 |
Includes index.
Introduction -- Part 1: Understanding and Exploiting Windows Networks -- Chapter 1: Network Investigation Overview -- Chapter 2: The Microsoft Network Structure -- Chapter 3: Beyond the Windows GUI -- Chapter 4: Windows Password Issues -- Chapter 5: Windows Ports and Services -- Part 2: Analyzing the Computer -- Chapter 6: Live-Analysis Techniques -- Chapter 7: Windows File Systems -- Chapter 8: The Registry Structure -- Chapter 9: Registry Evidence -- Chapter 10: Tool Analysis -- Part 3: Analyzing the Logs -- Chapter 11: Text-Based Logs -- Chapter 12: Windows Event Logs -- Chapter 13: Logon and Account Logon Events -- Chapter 14: Other Audit Events -- Chapter 15: Forensic Analysis of Event Logs -- Chapter 16: Presenting the Results.
Conduct Cutting-Edge Forensic Investigations of Computer Crimes. Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
There are no comments on this title.