Amazon cover image
Image from Amazon.com

Mastering Windows network forensics and investigation / Steve Anson and Steve Bunting.

By: Contributor(s): Material type: TextTextPublication details: Hoboken, New Jersey : Wiley, c2007Description: xxii 530 pages : illustrations ; 24 cmISBN:
  • 9780470097625
Subject(s): LOC classification:
  • HV 8079.C65 .A57 2007
Contents:
Introduction -- Part 1: Understanding and Exploiting Windows Networks -- Chapter 1: Network Investigation Overview -- Chapter 2: The Microsoft Network Structure -- Chapter 3: Beyond the Windows GUI -- Chapter 4: Windows Password Issues -- Chapter 5: Windows Ports and Services -- Part 2: Analyzing the Computer -- Chapter 6: Live-Analysis Techniques -- Chapter 7: Windows File Systems -- Chapter 8: The Registry Structure -- Chapter 9: Registry Evidence -- Chapter 10: Tool Analysis -- Part 3: Analyzing the Logs -- Chapter 11: Text-Based Logs -- Chapter 12: Windows Event Logs -- Chapter 13: Logon and Account Logon Events -- Chapter 14: Other Audit Events -- Chapter 15: Forensic Analysis of Event Logs -- Chapter 16: Presenting the Results.
Summary: Conduct Cutting-Edge Forensic Investigations of Computer Crimes. Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Digital Forensic GC HV 8079.C65 .A57 2007 (Browse shelf(Opens below)) c.1 Available NULIB000008361

Includes index.

Introduction -- Part 1: Understanding and Exploiting Windows Networks -- Chapter 1: Network Investigation Overview -- Chapter 2: The Microsoft Network Structure -- Chapter 3: Beyond the Windows GUI -- Chapter 4: Windows Password Issues -- Chapter 5: Windows Ports and Services -- Part 2: Analyzing the Computer -- Chapter 6: Live-Analysis Techniques -- Chapter 7: Windows File Systems -- Chapter 8: The Registry Structure -- Chapter 9: Registry Evidence -- Chapter 10: Tool Analysis -- Part 3: Analyzing the Logs -- Chapter 11: Text-Based Logs -- Chapter 12: Windows Event Logs -- Chapter 13: Logon and Account Logon Events -- Chapter 14: Other Audit Events -- Chapter 15: Forensic Analysis of Event Logs -- Chapter 16: Presenting the Results.

Conduct Cutting-Edge Forensic Investigations of Computer Crimes. Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

There are no comments on this title.

to post a comment.