LEADER 03841nam 22006135 450 001 9910865263503321 005 20250807124825.0 010 $a979-88-6880-193-8 024 7 $a10.1007/979-8-8688-0193-8 035 $a(MiAaPQ)EBC31357831 035 $a(Au-PeEL)EBL31357831 035 $a(CKB)32169707500041 035 $a(OCoLC)1436834896 035 $a(DE-He213)979-8-8688-0193-8 035 $a(OCoLC-P)1436834896 035 $a(CaSebORM)9798868801938 035 $a(EXLCZ)9932169707500041 100 $a20240529d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWindows Forensics $eUnderstand Analysis Techniques for Your Windows /$fby Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer 205 $a1st ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (484 pages) 300 $aDescription based upon print version of record. 300 $aRegistry Explorer 311 08$a979-88-6880-192-1 327 $aChapter 1: Introduction to Windows -- Chapter 2: Forensics Concepts -- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy -- Chapter 4: Windows File Artifacts -- Chapter 5: Windows Registry Part 1 -- Chapter 6: Windows Registry Part 2 -- Chapter 7: Windows Shadow Copy -- Chapter 8: Windows Memory Forensics -- Chapter 9: PowerShell Forensics -- Chapter 10: Web Browser Forensics -- Chapter 11: Windows Email Forensics -- Chapter 12: Microsoft Azure and Cloud Forensics -- Chapter 13: Data-Hiding Techniques in Windows -- Appendix A: Volatility Cheat Sheet -- Appendix B: Windows Registry Cheat Sheet. 330 $aThis book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity. The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet. What Will You Learn Understand Windows architecture Recover deleted files from Windows and the recycle bin Use volatility and PassMark volatility workbench Utilize Windows PowerShell scripting for forensic applications. 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aMicrosoft 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 14$aMicrosoft. 676 $a5,268 700 $aEasttom$b Chuck$01228300 701 $aButler$b William$0842450 701 $aPhelan$b Jessica$01742603 701 $aSai Bhagavatula$b Ramya$01742604 701 $aSteuber$b Sean$01742605 701 $aRodriguez$b Karely$01742606 701 $aIndy Balkissoon$b Victoria$01742607 701 $aNaseer$b Zehra$01742608 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910865263503321 996 $aWindows Forensics$94169338 997 $aUNINA