000 01732nam a2200241Ia 4500
003 NULRC
005 20250520100645.0
008 250520s9999 xx 000 0 und d
020 _a9780470097625
040 _cNULRC
050 _aHV 8079.C65 .A57 2007
100 _aAnson, Steve
_eauthor
245 0 _aMastering Windows network forensics and investigation /
_cSteve Anson and Steve Bunting.
260 _aHoboken, New Jersey :
_bWiley,
_cc2007
300 _axxii 530 pages :
_billustrations ;
_c24 cm
365 _bUSD28.98
504 _aIncludes index.
505 _aIntroduction -- Part 1: Understanding and Exploiting Windows Networks -- Chapter 1: Network Investigation Overview -- Chapter 2: The Microsoft Network Structure -- Chapter 3: Beyond the Windows GUI -- Chapter 4: Windows Password Issues -- Chapter 5: Windows Ports and Services -- Part 2: Analyzing the Computer -- Chapter 6: Live-Analysis Techniques -- Chapter 7: Windows File Systems -- Chapter 8: The Registry Structure -- Chapter 9: Registry Evidence -- Chapter 10: Tool Analysis -- Part 3: Analyzing the Logs -- Chapter 11: Text-Based Logs -- Chapter 12: Windows Event Logs -- Chapter 13: Logon and Account Logon Events -- Chapter 14: Other Audit Events -- Chapter 15: Forensic Analysis of Event Logs -- Chapter 16: Presenting the Results.
520 _aConduct Cutting-Edge Forensic Investigations of Computer Crimes. Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
650 _aMICROSOFT WINDOWS (COMPUTER FILE)
700 _aBunting, Steve
_eco-author
942 _2lcc
_cBK
999 _c10602
_d10602