Windows Forensic Analysis DVD Toolkit

Windows Forensic Analysis DVD Toolkit

Paperback Syngress Media

By (author) Harlan Carvey

$58.45
List price $67.15
You save $8.70 12% off

Free delivery worldwide
Available
Dispatched in 1 business day
When will my order arrive?

  • Publisher: Syngress Media,U.S.
  • Format: Paperback | 512 pages
  • Dimensions: 194mm x 234mm x 30mm | 921g
  • Publication date: 22 September 2009
  • Publication City/Country: Rockland, MA
  • ISBN 10: 1597494224
  • ISBN 13: 9781597494229
  • Edition: 2, Revised
  • Edition statement: 2nd Revised edition
  • Illustrations note: Approx. 130 illustrations
  • Sales rank: 250,811

Product description

'If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis' - Richard Bejtlich, Co-author of "Real Digital Forensics" and Amazon.com Top 500 Book Reviewer. 'The Registry Analysis chapter alone is worth the price of the book' -Troy Larson, Senior Forensic Investigator of Microsoft's IT Security Group. 'I also found that the entire book could have been written on just registry forensics. However, in order to create broad appeal, the registry section was probably shortened. You can tell Harlan has a lot more to tell' - Rob Lee, Instructor and Fellow at the SANS Technology Institute, coauthor of "Know Your Enemy: Learning About Security Threats, 2E". Author Harlan Carvey has brought his best-selling book up-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions, malware infections, and cybercrime happen on these systems. "Windows Forensic Analysis DVD Toolkit, 2E" covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline when an incident occurs, but due to staffing and budget constraints do not have the necessary knowledge to respond effectively. The book's companion DVD contains significant new and updated materials (movies, spreadsheet, code, etc.) not available any place else, because they are created and maintained by the author. It is the best-selling Windows Digital Forensic book completely updated in this 2nd edition. It helps you learn how to analyze data during live and post-mortem investigations. The DVD includes custom tools, updated code, movies, and spreadsheets.

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Harlan Carvey (CISSP) is a Vice President of Advanced Security Projects with Terremark Worldwide, Inc. Terremark is a leading global provider of IT infrastructure and "cloud computing services, based in Miami, FL. Harlan is a key contributor to the Engagement Services practice, providing disk forensics analysis, consulting, and training services to both internal and external customers. Harlan has provided forensic analysis services for the hospitality industry, financial institutions, as well as federal government and law enforcement agencies. Harlan's primary areas of interest include research and development of novel analysis solutions, with a focus on Windows platforms. Harlan holds a bachelor's degree in electrical engineering from the Virginia Military Institute and a master's degree in the same discipline from the Naval Postgraduate School. Harlan resides in Northern Virginia with his family.

Review quote

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."--Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

Table of contents

Chapter 1. Live Response: Collecting Volatile Data Chapter 2. Live Response: Analyzing Volatile Data Chapter 3. Windows Memory Analysis Chapter 4. Registry Analysis Chapter 5. File Analysis Chapter 6. Executable File Analysis Chapter 7. Rootkits and Rootkit Detection Chapter 8. Tying It All Together Chapter 9. Forensic Analysis on a Budget