Investigating Windows Systems

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Inves...

Full description

Bibliographic Details
Main Author: Carvey, Harlan A. (Author)
Format: Book
Language:English
Published: London : Elsevier Ltd. : Academic Press, 2018
Subjects:
LEADER 05593nam a2200637Ii 4500
001 e9cf5aee-1051-45ea-b771-b9a78433184f
005 20240811000000.0
008 180820s2018 enk o 000 0 eng d
015 |a GBB8G1925  |2 bnb 
016 7 |a 019030602  |2 Uk 
019 |a 1049279954 
020 |a 0128114169  |q (electronic bk.) 
020 |a 9780128114162  |q (electronic bk.) 
020 |z 0128114150 
020 |z 9780128114155 
035 |a (OCoLC)1048895861  |z (OCoLC)1049279954 
035 9 |a (OCLCCM-CC)1048895861 
037 |a 9780128114162  |b Ingram Content Group 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OPELS  |d OCLCF  |d NLE  |d IDB   |d UKMGB  |d OTZ  |d U3W  |d LVT  |d COO  |d D6H  |d C6I  |d OCLCQ  |d S2H  |d OCLCO  |d NLW  |d OCLCQ  |d OCLCO   |d COM  |d K6U 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OPELS  |d OCLCF  |d NLE  |d IDB  |d UKMGB  |d OTZ  |d U3W  |d LVT  |d COO  |d D6H  |d C6I  |d OCLCQ  |d S2H  |d OCLCO  |d NLW  |d OCLCQ  |d CSt 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d EBLCP  |d OPELS  |d OCLCF  |d NLE 
049 |a MAIN 
050 4 |a QA76.9.B32 
072 7 |a COM  |x 000000  |2 bisacsh 
072 7 |a ULD  |2 bicssc 
082 0 4 |a 005.8/6  |2 23 
100 1 |a Carvey, Harlan A.,  |e author  |1 http://viaf.org/viaf/121718678/ 
100 1 |a Carvey, Harlan A.,  |e author 
245 1 0 |a Investigating Windows Systems 
264 1 |a London :  |b Elsevier Ltd. :  |b Academic Press,  |c 2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Front Cover; Investigating Windows Systems; Copyright Page; Contents; About the Author; Preface; Intended Audience; Book Organization; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Acknowledgments; 1 The Analysis Process; Introduction; The Analysis Process; Goals; Analysis Plan; Reporting; Lessons Learned; Modifying the Analysis Process, Based on Lessons Learned; Sharing; The Rest of This Book; 2 Finding Malware; Introduction; Finding Malware-Windows XP; Image Format; Analysis Goal; Image Survey; Constructing a Timeline; System Time Changes; Documenting the Malware; Analysis Summary 
505 8 |a Analysis PointsFinding Malware-Windows 7; Analysis Goal; Image Survey; Constructing a Timeline; USB Device Analysis; Analysis Summary; Analysis Points; Final Words; 3 User Activity; Introduction; CFReDS Hacking Case Image; Analysis Goals; Analysis Plan; Timeline; Additional Data; Summary; Lessons Learned; Data Theft; Analysis Goals; Analysis Plan; Connected Devices; Data Theft; Outlook PST File; Other Data Sources; Summary; Lessons Learned; Joe's PC; Analysis Goals; Analysis Plan; Analysis; Viewing ThumbCache Database Contents; Sufficiency; Summary; Lessons Learned; 4 Web Server Compromise 
505 8 |a IntroductionWindows 2008 Web Server; Analysis Goals; Analysis Plan; Data Extraction; Analysis; Web Server Logs; Findings; Summary; 5 Setting Up A Testing Environment; Introduction; Setting Up A Testing Environment; Configuration; Testing and Documentation; File System Tunneling; Deleting Files; Volume Shadow Copies; Final Words; Index; Back Cover 
520 |a Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed August 21, 2018) 
596 |a 22 
650 0 |a Data recovery (Computer science) 
650 0 |a Electronic data processing  |x Backup processing alternatives 
650 6 |a Récupération des données (Informatique) 
650 6 |a Sauvegarde (Informatique) 
650 7 |a COMPUTER SCIENCE / General  |2 bisacsh 
650 7 |a COMPUTER SCIENCE  |x General  |2 bisacsh 
650 7 |a Data recovery (Computer science)  |2 fast 
650 7 |a Electronic data processing  |x Backup processing alternatives  |2 fast  
650 7 |a Electronic data processing  |x Backup processing alternatives  |2 fast 
655 4 |a Electronic books 
776 0 8 |i Print version:  |z 0128114150  |z 9780128114155  |w (OCoLC)1022772761 
999 1 0 |i e9cf5aee-1051-45ea-b771-b9a78433184f  |l a12797540  |s US-CST  |m investigating_windows_systems______________________________________________2018_______elseva________________________________________carvey__harlan_a___________________e 
999 1 0 |i e9cf5aee-1051-45ea-b771-b9a78433184f  |l a13663915  |s US-CST  |m investigating_windows_systems______________________________________________2018_______elseva________________________________________carvey__harlan_a___________________e 
999 1 0 |i e9cf5aee-1051-45ea-b771-b9a78433184f  |l 11690302  |s US-ICU  |m investigating_windows_systems______________________________________________2018_______elseva________________________________________carvey__harlan_a___________________e 
999 1 1 |l a12797540  |s ISIL:US-CST  |t BKS  |a SUL INTERNET  |b 12797540-1001  |c INTERNET RESOURCE  |d ASIS  |x SUL  |y 12797540-1001  |p UNLOANABLE 
999 1 1 |l a13663915  |s ISIL:US-CST  |t BKS  |a SUL INTERNET  |b 13663915-1001  |c INTERNET RESOURCE  |d ASIS  |x SUL  |y 13663915-1001  |p UNLOANABLE