Windows Forensics Understand Analysis Techniques for Your Windows

This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal...

Full description

Bibliographic Details
Main Authors: Easttom, Chuck, Butler, William (Author), Phelan, Jessica (Author), Sai Bhagavatula, Ramya (Author)
Format: eBook
Language:English
Published: Berkeley, CA Apress 2024, 2024
Edition:1st ed. 2024
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03035nmm a2200313 u 4500
001 EB002210619
003 EBX01000000000000001347819
005 00000000000000.0
007 cr|||||||||||||||||||||
008 240603 ||| eng
020 |a 9798868801938 
100 1 |a Easttom, Chuck 
245 0 0 |a Windows Forensics  |h Elektronische Ressource  |b Understand Analysis Techniques for Your Windows  |c by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer 
250 |a 1st ed. 2024 
260 |a Berkeley, CA  |b Apress  |c 2024, 2024 
300 |a XXIII, 470 p. 300 illus  |b online resource 
505 0 |a Chapter 1: Introduction to Windows -- Chapter 2: Forensics Concepts -- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy -- Chapter 4: Windows File Artifacts -- Chapter 5: Windows Registry Part 1 -- Chapter 6: Windows Registry Part 2 -- Chapter 7: Windows Shadow Copy -- Chapter 8: Windows Memory Forensics -- Chapter 9: PowerShell Forensics -- Chapter 10: Web Browser Forensics -- Chapter 11: Windows Email Forensics -- Chapter 12: Microsoft Azure and Cloud Forensics -- Chapter 13: Data-Hiding Techniques in Windows -- Appendix A: Volatility Cheat Sheet -- Appendix B: Windows Registry Cheat Sheet 
653 |a Microsoft software 
653 |a Microsoft 
653 |a Microsoft .NET Framework 
700 1 |a Butler, William  |e [author] 
700 1 |a Phelan, Jessica  |e [author] 
700 1 |a Sai Bhagavatula, Ramya  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/979-8-8688-0193-8 
856 4 0 |u https://doi.org/10.1007/979-8-8688-0193-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.268 
520 |a This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity. The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet. What Will You Learn Understand Windows architecture Recover deleted files from Windows and the recycle bin Use volatility and PassMark volatility workbench Utilize Windows PowerShell scripting for forensic applications