• Complain

Harlan Carvey - Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7

Here you can read online Harlan Carvey - Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: Syngress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2012
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Now in its third edition, Harlan Carvey has updated Windows Forensic Analysis Toolkit to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, 2nd Ed. (ISBN: 9781597494229), which focuses primarily on XP.Complete coverage and examples on Windows 7 systems Contains Lessons from the Field, Case Studies, and War Stories Companion online material, including electronic printable checklists, cheat sheets, free custom tools, and walk-through demos

Harlan Carvey: author's other books


Who wrote Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7? Find out the surname, the name of the author of the book and a list of all author's works by series.

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Windows Forensic Analysis Toolkit Harlan Carvey Technical Editor Jennifer Kolde - photo 1
Windows Forensic Analysis Toolkit
Harlan Carvey

Technical Editor

Jennifer Kolde

Windows Forensic Analysis Toolkit Acquiring Editor Chris Katsaropoulos - photo 2

Windows Forensic Analysis Toolkit

Acquiring Editor: Chris Katsaropoulos

Development Editor: Heather Scherer

Project Manager: Jessica Vaughan

Designer: Alisa Andreola

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

Copyright 2012 Elsevier Inc. All rights reserved

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the Publisher. Details on how to seek permission, further information about the Publishers permissions policies, and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Carvey, Harlan A.

Windows forensic analysis toolkit advanced analysis techniques for Windows 7 / by Harlan Carvey.

p. cm.

Includes bibliographical references.

ISBN 978-1-59749-727-5

1. Computer crimesInvestigationUnited StatesMethodology. 2. Microsoft Windows (Computer file)Security measures. 3. Computer networksSecurity measures. 4. InternetSecurity measures. 5. Computer security. I. Title.

HV8079.C65C3726 2012

363.25968dc23

2011043150

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

ISBN: 978-1-59749-727-5

Printed in the United States of America

11 12 13 14 15 10 9 8 7 6 5 4 3 2 1

For information on all Syngress publications visit our website at - photo 3

For information on all Syngress publications, visit our website at www.syngress.com.

To Terri and Kylieyou are my light and my foundation.

Preface

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the investigative process, as well as exploring new ways to approach problems in the field of digital forensic analysis. It was more than 13 years ago that I decided to focus on Windows systems specifically, in large part because no one else on the team I worked with at the time did so. We had folks who focused on routers and firewalls, as well as those who focused on Linux; however, almost no effort, beyond enabling configuration settings in the vulnerability scanner we used, was put toward really understanding Windows systems. As I moved from vulnerability assessments into incident response and digital forensic analysis, understanding what was happening under the hood on Windows systems, understanding what actions could create or modify certain artifacts, became a paramount interest. I am not an expert.

When I sat down to write this book, I wanted to take a different approach from the second edition; that is, rather than starting with the manuscript from the previous edition and adding new material, I wanted to start over completely and write an entirely new book, creating a companion book to the second edition. As I was writing the second edition, Windows 7 was gaining greater prominence in the marketplace, and there has been considerably more effort dedicated toward and developments as a result of research into Windows 7 artifacts. Even now, as I write this book (summer 2011), Windows 8 is beginning to poke its head over the horizon, and it likely wont be too awfully long before we begin to see Windows 8 systems. As such, theres a good deal more to write about and address, so I wanted to write a book that, rather than focusing on Windows XP and looking ahead now and again to Windows 7, instead focused on Windows 7 as an analysis platform and target, and refer back to previous versions of Windows when it made sense to do so.

Therefore, regardless of the title, this book is not intended to replace the second edition, but instead to be a companion edition to be used alongside the second edition. Let me say that againif you have the second edition of Windows Forensic Analysis, you will not want to get rid of it and replace it with this book. Instead, youll want to have both of them (as well as Windows Registry Forensics and Digital Forensics with Open-Source Tools) on your bookshelf or Kindle (or whichever ebook platform youre using). In fact, if you have just purchased this edition, you will want to also purchase a copy of the second edition, as well.

I will say upfront that there are some things not covered in this book. When writing this book, I did not want to reiterate some of the information available in other media, including previous editions of Windows Forensic Analysis. As such, while mentioning how physical memory can be collected from a Windows system, this book does not go into detail with respect to memory analysis; truthfully, this is a topic best covered in a book of its own. In this book, we also discuss malware detection within an acquired image, but we do not discuss malware analysis, as this topic has been addressed extremely well in its own book.

Intended Audience

This book is intended for anyone with an interest in developing a greater understanding of digital forensic analysis, specifically of Windows 7 systems. This includes digital forensic analysts, incident responders, students, law enforcement officers, and researchers, or just anyone whos interested in digital forensic analysis of Windows 7 systems. Even system administrators and hobbyists will get something useful from this book. Ive tried to point out how the information in this book can be used, by both forensic analysts and incident responders alike.

In reading this book, youll notice that there are several tools described throughout that were written in the Perl scripting language. Dont worry, you dont need to be a Perl expert (after all, neither am I) to use these scripts; not only are the scripts very simple to use, but in most cases, they are accompanied by Windows executables, compiled using Perl2.exe (found at

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7»

Look at similar books to Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7»

Discussion, reviews of the book Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.