01103nam--2200373---450-99000139058020331620050527130424.0000139058USA01000139058(ALEPH)000139058USA0100013905820040203d19741974km-y0itay0103----baengNL||||||||001yyModels and ultraproductsan introductiondi J. L. Bell and A. B. SlomsonAmsterdam [etc.]North Holland publishing company1974IX, 322 p.23 cm20012001001-------2001SovraproduzioniSaggiBELL,John L.119420SLOMSON,Alan B.53054ITsalbcISBD990001390580203316II.1.D. 995(IV A 1234)69025 L.M.IV ABKUMASIAV51020040203USA011635PATRY9020040406USA011738COPAT39020050527USA011304Models and ultraproducts933052UNISA03413nam 2200613 a 450 991097136480332120240514065439.0978661366226297811187216121118721616978111823608611182360849781280685323128068532897811182261481118226143(CaSebORM)9781118236086(MiAaPQ)EBC818114(OCoLC)852491280(OCoLC)ocn852491280(CKB)2670000000206233(Perlego)1013957(EXLCZ)99267000000020623320111215d2012 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierMastering windows network forensics and investigation /by Steve Anson and others2nd ed.Indianapolis John Wiley & Sons20121 online resource (698 p.)Sybex serious skills. Mastering Windows network forensics and investigationIncludes index.9781118163825 1118163826 Network investigation overview -- The Microsoft network structure -- Beyond the Windows GUI -- Windows password issues -- Windows ports and services -- Live-analysis techniques -- Windows filesystems -- The registry structure -- Registry evidence -- Introduction to malware -- Text-based logs -- Windows event logs -- Logon and account logon events -- Other audit events -- Forensic analysis of event logs -- Presenting the results -- The challenges of cloud computing and virtualization.An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. * Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network * Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response * Walks you through ways to present technically complicated material in simple terms that will hold up in court * Features content fully updated for Windows Server 2008 R2 and Windows 7 * Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes. Computer crimes: investigationComputer networks: securityComputer crimes: investigation.Computer networks: security.ELECTRONIC BOOKAnson Steve1163078Bunting SteveJohnson RyanPearson ScottUMIUMIBOOK9910971364803321Mastering windows network forensics and investigation4357824UNINA