Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Windows Network Forensics and Investigation

Buy

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this comprehensive guide from two seasoned law enforcement professionals. From recognizing high-tech criminal activity and collecting evidence to presenting it in a way that judges and juries can understand, this book covers the range of skills, standards, and step-by-step procedures you'll need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.

The book also covers the emerging field of "live forensics," where investigators examine a system to obtain evidence while it is still running, thus preserving live data that may be lost if the system is shut down.

COVERAGE INCLUDES:

  • Responding to a reported computer intrusion
  • Conducting the initial interview with the victims
  • Understanding how attackers exploit Windows networks
  • Deciphering Windows file systems, registries, and more
  • Analyzing data rapidly using live analysis techniques
  • Examining suspects' computers
  • Using EnCase(r) for Windows event log analysis
  • Presenting technically complicated material to juries

About the Authors

Steve Anson, CISSP, MCSE, is a special agent with the Pentagon’s Defense Criminal Investigative Service. He has a master’s degree in computer science as well as numerous industry certifications. As a former contract instructor for the FBI, he has taught hundreds of veteran federal agents, state and local police officers, and intelligence agency employees techniques for conducting computer-intrusion investigations. He also founded and supervised a local police department computer crime and information services unit and served as a task force agent for the FBI. He has conducted investigations involving large-scale computer intrusions, counterterrorism, crimes against children, and many other offenses involving the substantive use of computers.

Steve Bunting is a captain with the University of Delaware Police Department, where he is responsible for computer forensics, video forensics, and investigations involving computers. He has more than thirty years experience in law enforcement, and his background in computer forensics is extensive. He is a Certified Computer Forensics Technician (CCFT) and an EnCase Certified Examiner (EnCE). He was the recipient of the 2002 Guidance Software Certified Examiner Award of Excellence. He has a bachelor’s degree in applied professions/business management from Wilmington College and a computer applications certificate in network environments from the University of Delaware. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, including extortion, homicide, embezzlement, child exploitation, intellectual property theft, and unlawful intrusions into computer systems. He has testified in court on numerous occasions as a computer forensics expert. He has taught computer forensics for Guidance Software, makers of EnCase, and taught as a lead instructor at all course levels. He has been a presenter at several seminars and workshops, is the author of numerous white papers, and is the primary author of the book EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide, which was published by Sybex in early 2006.

(HTML tags aren't allowed.)

Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

PostGIS Cookbook
PostGIS Cookbook

For web developers and software architects this book will provide a vital guide to the tools and capabilities available to PostGIS spatial databases. Packed with hands-on recipes and powerful concepts.

Overview

  • Integrate PostGIS with web frameworks and implement OGC standards such as WMS and WFS using...

Wireframing Essentials (Community Experience Distilled)
Wireframing Essentials (Community Experience Distilled)

If you've ever wanted to be a User Experience (UX) designer, this book will give you a great head start. It's a comprehensive handbook to the core principles and leads you through design methodologies with many practical examples.

Overview

  • Get up to speed on the industry standard design...
Jump Start CSS: Get Up to Speed With CSS in a Weekend
Jump Start CSS: Get Up to Speed With CSS in a Weekend

This short SitePoint book provides readers with a fun and yet practical introduction to Cascading Style Sheets (CSS), the language used to style and lay out all web pages. This book will quickly get you up to speed with the fundamentals of CSS and give you the confidence to start experimenting on your own.

It covers:

...
Clocking in Modern VLSI Systems (Integrated Circuits and Systems)
Clocking in Modern VLSI Systems (Integrated Circuits and Systems)

The purpose of Clocking in Modern VLSI Systems is to provide a concise exposition of all major issues in clocking large state-of-the-art microprocessors and SoCs. The issues covered include clock generation and distribution, clocking elements, testability, alternative clocking styles, special techniques, and dealing with scaling and...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy