• Out-of-Stock
Windows Forensic Analysis DVD Toolkit
search
  • Windows Forensic Analysis DVD Toolkit
ID: 175947
Harlan Carvey
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer


" The Registry Analysis chapter is the only one of the books."
-Troy Larson, Senior Forensic Investigator of Microsoft's IT Security Group

"I can tell Harlan has a lot more to tell."
-Rob Lee, Instructor and Fellow at the SANS Technology Institute, coauthor of Know Your Enemy: Learning About Security Threats, 2E


Author Harlan Carvey has his best-selling book-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. Windows is the largest operating system on desktops and servers worldwide, which are more intrusions, malware infections, and cybercrime happen on these systems. Windows Forensic Analysis DVD Toolkit, 2E covers both live and post-mortem response, and analysis methodologies, addressing, federal government, students, and consultants. The book is possible, the system administrators, who are often the frontline. The book's companion DVD contains a new version of the album, it is created and maintained by the author.




  • Best-Selling Windows Digital Forensic book completely updated in this 2 nd Edition

  • Learn How to Analyze. Date During Live and Post-Mortem Investigations

  • DVD Includes Custom Tools, Updated Code, Movies, and Spreadsheets!



Chapter 1: Live Response: Collecting Volatile Data
Chapter 2: Live Response: Analyzing Volatile Data
Chapter 3: Windows Memory Analysis
Chapter 4: Registry Analysis
Chapter 5: File Analysis
Chapter 6: Executable File Analysis
Chapter 7: Rootkits and Rootkit Detection
Chapter 8: Tying It All Together
Chapter 9: Forensic Analysis on a Budget
175947

Other products in the same category (16)