• Complain

Carvey - Investigating Windows Systems

Here you can read online Carvey - Investigating Windows Systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: London, year: 2018, publisher: Elsevier Ltd. : Academic Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Carvey Investigating Windows Systems
  • Book:
    Investigating Windows Systems
  • Author:
  • Publisher:
    Elsevier Ltd. : Academic Press
  • Genre:
  • Year:
    2018
  • City:
    London
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Investigating Windows Systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Investigating Windows Systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation,Investigating Windows Systemsprovides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.
Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way.
A must-have guide for those in the field of digital forensic analysis and incident response.

Carvey: author's other books


Who wrote Investigating Windows Systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Investigating Windows Systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Investigating Windows Systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of illustrations Figures in Chapter 1 Figures in - photo 1
Table of Contents
List of illustrations
  1. Figures in Chapter 1
  2. Figures in Chapter 2
  3. Figures in Chapter 3
  4. Figures in Chapter 4
  5. Figures in Chapter 5
Landmarks
Investigating Windows Systems Harlan Carvey Table of Contents Copyright - photo 2
Investigating Windows Systems

Harlan Carvey

Table of Contents Copyright Academic Press is an imprint of Elsevier 125 - photo 3

Table of Contents
Copyright

Academic Press is an imprint of Elsevier

125 London Wall, London EC2Y 5AS, United Kingdom

525 B Street, Suite 1650, San Diego, CA 92101, United States

50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom

Copyright 2018 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: http://www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

ISBN: 978-0-12-811415-5

For Information on all Academic Press publications visit our website at https://www.elsevier.com/books-and-journals

Publisher Stacy Masucci Acquisition Editor Elizabeth Brown Editorial - photo 4

Publisher: Stacy Masucci

Acquisition Editor: Elizabeth Brown

Editorial Project Manager: Emily Thomson

Production Project Manager: Sujatha Thirugnana Sambandam

Cover Designer: Victoria Pearson

Typeset by MPS Limited, Chennai, India

About the Author

Harlan Carvey has been involved in the information security field for almost 30 years. Stating out as a communications officer in the United States military, he later transitioned to the private sector, where he began performing vulnerability assessments. From there, it was a natural transition to digital forensic analysis and incident response. He also has a good bit of experience in hunting and responding to target threat actors, colloquially referred to as APT.

Harlan is an accomplished author, public speaker, and developer of open source tools. He dabbles in other activities, including home brewing, horseback riding, and backing gooseneck horse trailers into tight parking spots. He also enjoys answering questions using only movie quotes, with A Few Good Men and the Deadpool movies being some of his favorites.

Harlan earned a bachelors degree in electrical engineering from the Virginia Military Institute, and a masters degree in the same discipline from the Naval Postgraduate School. He resides in Virginia, where he enjoys listening to the Hair Nation channel on Sirius XM.

Preface

I am not an expert. I have never claimed to be an expert, particularly at analyzing Windows systems. As I have done before, got to a point where I looked around at the materials I had written into blog posts, into various documents, and even in a hard copy notebook and on scraps of paper, and saw that I had reached a critical mass. At that point, once I had stacked everything up, I felt that I likely had too much for a blog post (definitely too much for Twitter), and should just put everything into a book.

Looking back, I really feel like I decided to write this book for a couple of reasons. First, all of my earlier books have included lists of artifacts to be analyzed and tools for parsing various data sources, but little in the way of the thought process and analysis decisions that go into the actual analysis. This thought process is something I follow pretty much every time I perform analysis of an acquired image, and I thought that, taking a different approach with this book would be beneficial to someone. This is also due to the fact that when I have attended training courses and conference presentations, something I have asked a number of times is, what is the analysis decision that led you to this point? I thought that since I have had that question, is it possible that others might have had the same or similar questions? What was different about someone elses experiences such that they chose to follow one path of analysis over another? My thinking has been that by engaging with each other and understanding different viewpoints, we all grow, develop, and get better at analysis.

Another reason for writing this book is that there are a number of sites you can visit online that describe the use of open source and freely available tools for parsing data sources. However, rather than listing the tools and providing suggestions regarding how those tools might be used, I thought it would be a good idea to provide example analyses, from start to finish, and include the thought processes and analysis decisions along the way with respect to what tool to use, why, and what the analysis of the output of the tool provided, or led to.

In this book, I relied upon the kindness of others who have posted images of Windows systems online as part of forensic challenges. To each and everyone of them, I am grateful. In some cases, these online challenges have links to analysis performed by others, but what is often missing is the decision the analyst made as to why they did something. Why did you start there, or why did you choose one direction, or one data source, in your analysis over another?

Throughout this book, I have tried to remain true to a couple of base tenants and concepts. First, documentation is everything. As is often said on the Internet, picture, or it did not happen. That is to say, unless you have documentation of your actions (in this case, a picture), it did not really happen. The same thing applies to forensic analysis; over the years, many of us have shared the euphemism of having to explain what actions we took and decisions we made during analysis 6 months ago. Well, it was all a euphemism, until it was not. I have worked with analysts who have had to go back to an engagement that was 12 months old, and try to explain what they did to their boss, or to legal counsel, without any documentation whatsoever. Furthermore, too many times, we miss the opportunity to share findings with other analysts, or even simply use what we learned on future engagements because we did not document what we did, nor what we found. We cannot remember everything, and baking our findings back into our analysis tools and processes means that we do not have to.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Investigating Windows Systems»

Look at similar books to Investigating Windows Systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Investigating Windows Systems»

Discussion, reviews of the book Investigating Windows Systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.