feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Burlington, MA :Syngress Pub.,
    UID:
    almahu_9948026486202882
    Format: 1 online resource (386 p.)
    Edition: 1st ed.
    ISBN: 1-281-11265-8 , 9786611112653 , 0-08-055644-2
    Content: The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who
    Note: "Incident response and cybercrime investigation secrets"--Cover. , Cover; Contents; Preface; Chapter 1: Live Response: Collecting Volatile Data; Introduction; Live Response; What Data to Collect; Nonvolatile Information; Live-Response Methodologies; Chapter 2: Live Response: Data Analysis; Introduction; Data Analysis; Chapter 3: Windows Memory Analysis; Introduction; Dumping Physical Memory; Analyzing a Physical Memory Dump; Collecting Process Memory; Chapter 4: Registry Analysis; Introduction; Inside the Registry; Registry Analysis; Chapter 5: File Analysis; Introduction; Event Logs; File Metadata; Alternative Methods of Analysis , Chapter 6: Executable File AnalysisIntroduction; Static Analysis; Dynamic Analysis; Chapter 7: Rootkits and Rootkit Detection; Introduction; Rootkits; Rootkit Detection; Index , English
    Additional Edition: ISBN 1-59749-156-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949698034602882
    Format: 1 online resource (221 p.)
    Edition: 1st edition
    ISBN: 1-281-14513-0 , 9786611145132 , 0-08-055563-2
    Content: This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP,
    Note: Description based upon print version of record. , Front Cover; Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring; Copyright Page; Dedication Page; Author; Technical Editor; Contributing Author; Contents; Preface; Author Acknowledgements; Part I: Perl Scripting and Live Response; Built-in Functions; Win32.pl; Pclip.pl; Running Processes; Netstat1.pl; Netstat2.pl; Netstat3.pl; Accessing the API; Getsys.pl; WMI; Fw.pl; Nic.pl; Ndis.pl; Di.pl; Ldi.pl; Accessing the Registry; Bho.pl; Uassist.pl; ProScripts; Acquire1.pl; Final Touches; Part II: Perl Scripting and Computer Forensic Analysis; Log Files , Parsing Binary FilesLslnk.pl; Registry; SAMParse.pl; SECParse.pl; Recentdocs.pl; UAssist.pl; Event Logs; Evt2xls.pl; Parsing RAM Dumps; Lsproc.pl; Lspi.pl; ProScripts; Uassist.pl; SysRestore.pl; Prefetch.pl; Parsing Other Data; Cc-sort.pl; Final Touches; Part III: Monitoring Windows Applications with Perl; In This Toolbox; Core Application Processes; Monitoring System Key Performance Indicators; Monitoring System CPU Utilization; Monitoring System Memory Utilization; Monitoring System Network Utilization; Monitoring a Core Application Process , Monitoring Process Availability a Specific ProcessMonitoring CPU Utilization for a Specific Process; Monitoring Memory Utilization for a Specific Process; Setting and Using Thresholds; Loading an XML Configuration File; Evaluating Thresholds; Taking Action; Putting it all Together; Core Application Dependencies; Monitoring Remote System Availability; Monitoring Available Disk Space; Monitoring Remote Disk Availability; Monitoring Remote Databases; Monitoring Other Dependencies; Web Services; Monitoring Web Service Availability; Monitoring Web Service Functionality , Building a Monitoring SystemSummary; Index , English
    Additional Edition: ISBN 1-59749-173-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948025355402882
    Format: 1 online resource (xvii, 264 pages) : , illustrations
    Edition: 1st edition.
    ISBN: 1-283-07007-3 , 9786613070074 , 1-59749-587-5
    Content: Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners Details
    Note: Description based upon print version of record. , Using open source platform tools for performing computer forensics on TargetSystems: Windows, Mac, Linux, Unix, etc. , Front Cover; Digital Forensics with Open Source Tools; Copyright; Table of Contents; About the Authors; Acknowledgments; Introduction; Chapter 1. Digital Forensics with Open Source Tools; Welcome to "Digital Forensics with Open Source Tools"; What Is "Digital Forensics?"; What is "Open Source?"; Benefits of Open Source Tools; Summary; References; Chapter 2. Open Source Examination Platform; Preparing the Examination System; Using Linux as the Host; Using Windows as the Host; Summary; References; Chapter 3. Disk and File System Analysis; Media Analysis Concepts; The Sleuth Kit , Partitioning and Disk LayoutsSpecial Containers; Hashing; Carving; Forensic Imaging; Summary; References; Chapter 4. Windows Systems and Artifacts; Introduction; Windows File Systems; Registry; Event Logs; Prefetch Files; Shortcut Files; Windows Executables; Summary; References; Chapter 5. Linux Systems and Artifacts; Introduction; Linux File Systems; Linux Boot Process and Services; Linux System Organization and Artifacts; User Accounts; Home Directories; Logs; Scheduling Tasks; Summary; References; Chapter 6. Mac OS X Systems and Artifacts; Introduction; OS X File System Artifacts , OS X System ArtifactsUser Artifacts; Summary; References; Chapter 7. Internet Artifacts; Introduction; Browser Artifacts; Mail Artifacts; Summary; References; Chapter 8. File Analysis; File Analysis Concepts; Images; Audio; Video; Archives; Documents; Summary; References; Chapter 9. Automating Analysis and Extending Capabilities; Introduction; Graphical Investigation Environments; Automating Artifact Extraction; Timelines; Summary; References; Appendix A. Free, Non-open Tools of Note; Introduction; Chapter 3: Disk and File System Analysis; Chapter 4: Windows Systems and Artifacts , Chapter 7: Internet ArtifactsChapter 8: File Analysis; Chapter 9: Automating Analysis and Extending Capabilities; Validation and Testing Resources; References; Index
    Additional Edition: ISBN 1597495867
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948026401902882
    Format: 1 online resource (xxii, 267 pages) : , illustrations
    Edition: 1st edition
    ISBN: 9786611020262 , 1-281-02026-5 , 1-59749-984-6
    Series Statement: Gale eBooks
    Content: Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combinin
    Note: Description based upon print version of record. , Half Title; Title Page; Copyright; Contents; Acknowledgments; About the Author; About the Technical Editor; Foreword; Preface; 1 Introduction; Digital Evidence Collection; Simple File Copying; "Dead Box" Approaches; "Live Box" Approaches; Decision-Making FlowChart; Preview/Triage; SmartPhones and Cellular Devices; GPS; Summary; Bibliography; 2 High Tech Interview; Introduction; The Main Goal of Questioning a Suspect; The Line of Questions for Suspects; Computer skills, ability, and knowledge; Password, encryption, steganography, and deletion; Control of the device(s) in question , Other devices used by suspectSoftware used by suspect; Internet use by suspect; Online chat, email, forums, boards, online social networking; Peer-to-Peer Networking; File storage; Crime specific-child pornography; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim questions-identity theft; Computer crime victim questions-harassment via email/text/online postings; Questions for Network Administrators; Customer accounts-Internet Service Provider, online data hosting, other online services; Summary; Bibliography; 3 Physical Investigations , IntroductionHazards of Acting Upon Minimal Information; Physical Surveillance; Mobile surveillance; Aerial surveillance; Video surveillance; Covertly installed cameras; Other sources of surveillance records; Surveillance notes and timelines; Electronic Surveillance; Oral intercepts; Dialed number recorders; Trash runs; Tracking cell phones; Vehicle tracking; Keystroke logging; Consumer purchase records; Obtaining Personal Information; Undercover and Informant Operations; Witnesses; Neighbors as Surveillance Agents; Deconfliction; Summary; Bibliography; 4 Technical Investigations; Introduction , Digital Investigative TechniquesWhat is a person?; Who? What? When? Why? Where? And How?; Location; Time; Wireless connections; Network (cloud) connections; Photos and videos; Geolocation warning; Internet evidence (mobile devices, computers, and game systems); Notes on device interconnectivity; Internet history; Online groups; Game consoles; HTTP extraction; IP address and relationships to devices; Texts and emails; Calendar evidence; "Other" Device Forensics; Online Social Networking; User Activity; User logins; User-specific computer activity; Digital Authorship; Profiling , Biological Forensic EvidenceTriage and Previews; Summary; Bibliography; 5 Putting It All Together; "2 + 2 = Putting it all together"; The evidence as a whole; Avoiding assumptions; Who did it?; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography , 7 Case Presentation
    Additional Edition: ISBN 1-59749-985-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    London, England :Academic Press,
    UID:
    almahu_9949697768602882
    Format: 1 online resource (137 pages)
    Edition: 1st edition
    ISBN: 0-12-811416-9
    Content: Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response. Provides the reader with a detailed walk-through of the analysis process, with decision points along the way, assisting the user in understanding the resulting data Coverage will include malware detection, user activity, and how to set up a testing environment Written at a beginner to intermediate level for anyone engaging in the field of digital forensic analysis and incident response
    Note: Includes index. , Disponible versión electrónica e impresa
    Additional Edition: ISBN 0-12-811415-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9948026408502882
    Format: 1 online resource (294 p.)
    Edition: 3rd ed.
    ISBN: 1-283-44800-9 , 9786613448002 , 1-59749-728-2
    Content: Windows is the largest operating system on desktops and servers worldwide, which means more intrusions, malware infections, and cybercrime happen on these systems. Author Harlan Carvey has brought his bestselling book up-to-date by covering the newest version of Windows, Windows 7. Windows Forensic Analysis Toolkit, 3e, covers live and postmortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline w
    Note: Description based upon print version of record. , Windows Forensic Analysis Toolkit; Copyright Page; Contents; Preface; Intended Audience; Organization of this Book; Chapter 1: Analysis Concepts; Chapter 2: Immediate Response; Chapter 3: Volume Shadow Copies; Chapter 4: File Analysis; Chapter 5: Registry Analysis; Chapter 6: Malware Detection; Chapter 7: Timeline Analysis; Chapter 8: Application Analysis; Online Content; Acknowledgments; About the Author; About the Technical Editor; 1 Analysis Concepts; Introduction; Analysis Concepts; Windows Versions; Analysis Principles; Goals; Tools Versus Processes; Locard's Exchange Principle , Avoiding SpeculationDirect and Indirect Artifacts; Least Frequency of Occurrence; Documentation; Convergence; Virtualization; Setting up an Analysis System; Summary; 2 Immediate Response; Introduction; Being Prepared to Respond; Questions; The Importance of Preparation; Logs; Data Collection; Training; Summary; 3 Volume Shadow Copies; Introduction; What Are "Volume Shadow Copies"?; Registry Keys; Live Systems; ProDiscover; F-Response; Acquired Images; VHD Method; VMWare Method; Automating VSC Access; ProDiscover; Summary; Reference; 4 File Analysis; Introduction; MFT; File System Tunneling , Event LogsWindows Event Log; Recycle Bin; Prefetch Files; Scheduled Tasks; Jump Lists; Hibernation Files; Application Files; Antivirus Logs; Skype; Apple Products; Image Files; Summary; References; 5 Registry Analysis; Introduction; Registry Analysis; Registry Nomenclature; The Registry as a Log File; USB Device Analysis; System Hive; Services; Software Hive; Application Analysis; NetworkList; NetworkCards; Scheduled Tasks; User Hives; WordWheelQuery; Shellbags; MUICache; UserAssist; Virtual PC; TypedPaths; Additional Sources; RegIdleBackup; Volume Shadow Copies; Virtualization; Memory; Tools , SummaryReferences; 6 Malware Detection; Introduction; Malware Characteristics; Initial Infection Vector; Propagation Mechanism; Persistence Mechanism; Artifacts; Detecting Malware; Log Analysis; Dr. Watson Logs; Antivirus Scans; AV Write-ups; Digging Deeper; Packed Files; Digital Signatures; Windows File Protection; Alternate Data Streams; PE File Compile Times; MBR Infectors; Registry Analysis; Internet Activity; Additional Detection Mechanisms; Seeded Sites; Summary; References; 7 Timeline Analysis; Introduction; Timelines; Data Sources; Time Formats; Concepts; Benefits; Format; Time , SourceSystem; User; Description; TLN Format; Creating Timelines; File System Metadata; Event Logs; Windows XP; Windows 7; Prefetch Files; Registry Data; Additional Sources; Parsing Events into a Timeline; Thoughts on Visualization; Case Study; Summary; 8 Application Analysis; Introduction; Log Files; Dynamic Analysis; Network Captures; Application Memory Analysis; Summary; References; Index , English
    Additional Edition: ISBN 1-59749-727-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948171414302882
    Format: 1 online resource (1 volume) : , illustrations
    Edition: Second edition.
    ISBN: 0-12-803335-5
    Content: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis. Named a Best Digital Forensics Book by InfoSec Reviews Packed with real-world examples using freely available open source tools Provides a deep explanation and understanding of the Windows Registry—perhaps the least understood and employed source of information within Windows systems Includes a companion website that contains the code and author-created tools discussed in the book Features updated, current tools and techniques Contains completely updated content throughout, with all new coverage of the latest versions of Windows
    Note: Includes index. , Front Cover -- WINDOWS REGISTRYFORENSICS -- WINDOWS REGISTRY FORENSICS: Advanced Digital Forensic Analysis of the Windows Registry -- Copyright -- Dedication -- CONTENTS -- ABOUT THE AUTHOR -- ABOUT THE TECHNICAL EDITOR -- PREFACE -- Intended Audience -- Book Organization -- Chapter 1: Registry Analysis -- Chapter 2: Processes and Tools -- Chapter 3: Analyzing the System Hives -- Chapter 4: Case Studies: User Hives -- Chapter 5: RegRipper -- ACKNOWLEDGMENTS -- 1 - REGISTRY ANALYSIS -- Introduction -- Core Analysis Concepts -- Locard's Exchange Principle -- Least Frequency of Occurrence -- Windows Isn't Just "Windows" -- Remnants -- Goals -- Documentation -- Challenges of Registry Analysis -- What Is the Windows Registry? -- Purpose of the Windows Registry -- Location of the Windows Registry on Disk -- Where Else Can We Find Registry Data? -- Nomenclature -- Registry Structure -- Registry Key Cells -- Registry Value Cells -- Summary -- 2 - PROCESSES AND TOOLS -- Introduction -- Forensic Analysis -- Viewing Registry Hives -- RegEdit -- Windows Registry Recovery -- Registry Explorer -- Pros and Cons -- Parsers -- Pros and Cons -- RegRipper -- Timeline Analysis -- Differencing -- Deleted Keys and Values -- Memory -- Summary -- 3 - ANALYZING THE SYSTEM HIVES -- Introduction -- Artifact Categories -- Security Hive -- SAM Hive -- Cracking User Passwords -- System Hive -- Finding the "Current" ControlSet -- System Configuration Information -- System Name -- ClearPagefileAtShutdown -- Network Interfaces -- Routes -- File System Settings -- Prefetch Settings -- AutoStart -- Windows Services -- Program Execution -- AppCompatCache -- Malware -- USB Devices -- Mapping Devices to Drive Letters -- Software Hive -- System Configuration Information -- Windows Version -- ProfileList -- Network Cards -- Wireless Connections -- AutoStart -- The Run Key. , The Notify Key -- Image File Execution Options -- AppInit_DLLs -- Shell Extensions -- Browser Helper Objects -- Scheduled Tasks -- AppCompatFlags -- Program Execution -- LANDesk -- Malware -- Audio Devices -- AmCache Hive -- Summary -- 4 - CASE STUDIES: USER HIVES -- Introduction -- NTUSER.DAT -- System Configuration Information -- AutoStart -- The Run Key -- The RunOnce Key -- Other AutoStart Locations -- Program Execution -- Applets -- SysInternals -- UserAssist -- Application Compatibility Assistant -- Terminal Server Client -- Malware -- File Access -- RecentDocs -- ComDlg32 -- Microsoft Office File/Place MRUs -- TrustRecords -- Adobe Reader -- User Activity -- TypedPaths -- TypedURLS -- Searches -- File Associations -- USRCLASS.DAT -- AutoStart -- Program Execution -- File Access -- Photos -- Shellbags -- Summary -- 5 - REGRIPPER -- Introduction -- What Is RegRipper? -- Plugins -- Profiles -- Getting the Most Out of RegRipper -- Finding Out About Plugins -- Creating New Plugins -- Create Your Own Profiles -- Extending RegRipper -- What to Do When Something Goes Wrong -- Summary -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- X -- Z -- Back Cover.
    Additional Edition: ISBN 0-12-803291-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Amsterdam ; Boston ; Heidelberg ; London ; New York ; Oxford ; Paris ; San Diego ; San Francisco ; Singapore ; Sydney ; Tokyo :Syngress,
    UID:
    almafu_BV042306946
    Format: 1 Online-Ressource (xvii, 264 Seiten) : , Illustrationen.
    ISBN: 978-1-59749-586-8 , 1-59749-586-7
    Note: Based on the use of open source tools, this book lends itself to many organizations as well as students who do not have means to purchase new tools for different investigations. Well known forensic methods are demonstrated using open-source computer forensic tools (Sleuthkit, Foremost, dcdd, pyag, etc.) for examining a wide range of target systems (Windows, Mac, Linux, Unix, etc.). The digital forensics industry is growing a rapid pace and this book is perfect for someone entering the field that does not have access to corporate tools. Written by world-renowned forensic practitioners Covers open source forensics tools for all major systems: Windows, Mac, and Linux Uses the most current examination and analysis techniques in the field
    Additional Edition: Erscheint auch als Druck-Ausgabe
    Language: English
    Keywords: Computerkriminalität ; Open Source
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949697639902882
    Format: 1 online resource (321 p.)
    Edition: 1st edition
    ISBN: 1-281-07186-2 , 9786611071868 , 0-08-050589-9 , 1-59749-159-4
    Content: Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Securit
    Note: Includes index. , Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch? , How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security , IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing , Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . , Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index , English
    Additional Edition: ISBN 1-59749-114-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9948025328302882
    Format: 1 online resource (225 p.)
    ISBN: 1-282-96746-0 , 9786612967467 , 1-59749-581-6
    Content: Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens
    Note: Includes index. , Machine generated contents note: Chapter 1. Registry AnalysisChapter 2. ToolsChapter 3. Analysis: Registry keys and values of interest (System-wide keys/values) Chapter 4. Analysis: Registry keys and values of interest (User-specific keys/values). , English
    Additional Edition: ISBN 1-59749-580-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages