LEADER 03275nam 22006374a 450 001 9910458843303321 005 20200520144314.0 010 $a1-281-11265-8 010 $a9786611112653 010 $a0-08-055644-2 035 $a(CKB)1000000000383569 035 $a(EBL)328624 035 $a(OCoLC)476126401 035 $a(SSID)ssj0000272284 035 $a(PQKBManifestationID)11207181 035 $a(PQKBTitleCode)TC0000272284 035 $a(PQKBWorkID)10308874 035 $a(PQKB)10552644 035 $a(MiAaPQ)EBC328624 035 $a(Au-PeEL)EBL328624 035 $a(CaPaEBR)ebr10204205 035 $a(CaONFJC)MIL111265 035 $a(EXLCZ)991000000000383569 100 $a20070604d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWindows forensic analysis$b[electronic resource] $eDVD toolkit, /$fHarlan Carvey 210 $aBurlington, MA $cSyngress Pub.$dc2007 215 $a1 online resource (386 p.) 300 $a"Incident response and cybercrime investigation secrets"--Cover. 311 $a1-59749-156-X 320 $aIncludes bibliographical references and index. 327 $aCover; Contents; Preface; Chapter 1: Live Response: Collecting Volatile Data; Introduction; Live Response; What Data to Collect; Nonvolatile Information; Live-Response Methodologies; Chapter 2: Live Response: Data Analysis; Introduction; Data Analysis; Chapter 3: Windows Memory Analysis; Introduction; Dumping Physical Memory; Analyzing a Physical Memory Dump; Collecting Process Memory; Chapter 4: Registry Analysis; Introduction; Inside the Registry; Registry Analysis; Chapter 5: File Analysis; Introduction; Event Logs; File Metadata; Alternative Methods of Analysis 327 $aChapter 6: Executable File AnalysisIntroduction; Static Analysis; Dynamic Analysis; Chapter 7: Rootkits and Rootkit Detection; Introduction; Rootkits; Rootkit Detection; Index 330 $aThe only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who 606 $aComputer crimes$xInvestigation$zUnited States$xMethodology 606 $aComputer networks$xSecurity measures 606 $aInternet$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation$xMethodology. 615 0$aComputer networks$xSecurity measures. 615 0$aInternet$xSecurity measures. 615 0$aComputer security. 676 $a363.25/0968 700 $aCarvey$b Harlan A$0523172 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910458843303321 996 $aWindows forensic analysis$9827878 997 $aUNINA