|
|
|
|
LEADER |
03035nmm a2200313 u 4500 |
001 |
EB002210619 |
003 |
EBX01000000000000001347819 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
240603 ||| eng |
020 |
|
|
|a 9798868801938
|
100 |
1 |
|
|a Easttom, Chuck
|
245 |
0 |
0 |
|a Windows Forensics
|h Elektronische Ressource
|b Understand Analysis Techniques for Your Windows
|c by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer
|
250 |
|
|
|a 1st ed. 2024
|
260 |
|
|
|a Berkeley, CA
|b Apress
|c 2024, 2024
|
300 |
|
|
|a XXIII, 470 p. 300 illus
|b online resource
|
505 |
0 |
|
|a Chapter 1: Introduction to Windows -- Chapter 2: Forensics Concepts -- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy -- Chapter 4: Windows File Artifacts -- Chapter 5: Windows Registry Part 1 -- Chapter 6: Windows Registry Part 2 -- Chapter 7: Windows Shadow Copy -- Chapter 8: Windows Memory Forensics -- Chapter 9: PowerShell Forensics -- Chapter 10: Web Browser Forensics -- Chapter 11: Windows Email Forensics -- Chapter 12: Microsoft Azure and Cloud Forensics -- Chapter 13: Data-Hiding Techniques in Windows -- Appendix A: Volatility Cheat Sheet -- Appendix B: Windows Registry Cheat Sheet
|
653 |
|
|
|a Microsoft software
|
653 |
|
|
|a Microsoft
|
653 |
|
|
|a Microsoft .NET Framework
|
700 |
1 |
|
|a Butler, William
|e [author]
|
700 |
1 |
|
|a Phelan, Jessica
|e [author]
|
700 |
1 |
|
|a Sai Bhagavatula, Ramya
|e [author]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
028 |
5 |
0 |
|a 10.1007/979-8-8688-0193-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/979-8-8688-0193-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.268
|
520 |
|
|
|a This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity. The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet. What Will You Learn Understand Windows architecture Recover deleted files from Windows and the recycle bin Use volatility and PassMark volatility workbench Utilize Windows PowerShell scripting for forensic applications
|