Mastering Windows Network Forensics and Investigation - Steven Anson, Steve Bunting

Mastering Windows Network Forensics and Investigation

Buch | Softcover
552 Seiten
2007
John Wiley & Sons Ltd (Verlag)
978-0-470-09762-5 (ISBN)
55,85 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Conduct Cutting-Edge Forensic Investigations of Computer Crimes. Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
This comprehensive guide provides you with the training you need to arm yourself against phishing, bank fraud, unlawful hacking, and other computer crimes. Two seasoned law enforcement professionals discuss everything from recognizing high-tech criminal activity and collecting evidence to presenting it in a way that judges and juries can understand. They cover the range of skills, standards, and step-by-step procedures you'll need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.

Steve Anson , CISSP, MCSE, is a special agent with the Pentagon's Defense Criminal Investigative Service. He has a master's degree in computer science as well as numerous industry certifications. As a former contract instructor for the FBI, he has taught hundreds of veteran federal agents, state and local police officers, and intelligence agency employees techniques for conducting computerintrusion investigations. He also founded and supervised a local police department computer crime and information services unit and served as a task force agent for the FBI. He has conducted investigations involving large-scale computer intrusions, counterterrorism, crimes against children, and many other offenses involving the substantive use of computers. Steve Bunting is a captain with the University of Delaware Police Department, where he is responsible for computer forensics, video forensics, and investigations involving computers. He has more than thirty years experience in law enforcement, and his background in computer forensics is extensive. He is a Certified Computer Forensics Technician (CCFT) and an EnCase Certified Examiner (EnCE). He was the recipient of the 2002 Guidance Software Certified Examiner Award of Excellence. He has a bachelor's degree in applied professions/business management from Wilmington College and a computer applications certificate in network environments from the University of Delaware. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, including extortion, homicide, embezzlement, child exploitation, intellectual property theft, and unlawful intrusions into computer systems. He has testified in court on numerous occasions as a computer forensics expert. He has taught computer forensics for Guidance Software, makers of EnCase, and taught as a lead instructor at all course levels. He has been a presenter at several seminars and workshops, is the author of numerous white papers, and is the primary author of the book EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide , which was published by Sybex in early 2006. You can reach him at sbunting@udel.edu.

Introduction. Part 1: Understanding and Exploiting Windows Networks. Chapter 1: Network Investigation Overview. Chapter 2: The Microsoft Network Structure. Chapter 3: Beyond the Windows GUI. Chapter 4: Windows Password Issues. Chapter 5: Windows Ports and Services. Part 2: Analyzing the Computer. Chapter 6: Live-Analysis Techniques. Chapter 7: Windows File Systems. Chapter 8: The Registry Structure. Chapter 9: Registry Evidence. Chapter 10: Tool Analysis. Part 3: Analyzing the Logs. Chapter 11: Text-Based Logs. Chapter 12: Windows Event Logs. Chapter 13: Logon and Account Logon Events. Chapter 14: Other Audit Events. Chapter 15: Forensic Analysis of Event Logs. Chapter 16: Presenting the Results. Appendix A: The Bottom Line. Index.

Erscheint lt. Verlag 30.3.2007
Verlagsort Chichester
Sprache englisch
Maße 189 x 235 mm
Gewicht 806 g
Einbandart Paperback
Themenwelt Informatik Betriebssysteme / Server Windows
Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Strafrecht Kriminologie
ISBN-10 0-470-09762-0 / 0470097620
ISBN-13 978-0-470-09762-5 / 9780470097625
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Insider-Wissen – praxisnah & kompetent

von Ed Bott

Buch | Hardcover (2023)
dpunkt (Verlag)
44,90
Daten abfragen und verarbeiten mit Excel und Power BI

von Ignaz A. Schels

Buch (2023)
Hanser (Verlag)
49,99