Windows forensics analyst field guide : engage in proactive cyber defense using digital forensics techniques
Description
More Details
Notes
Table of Contents
Citations
Mohammed, M. (2023). Windows forensics analyst field guide: engage in proactive cyber defense using digital forensics techniques (1st edition.). Packt Publishing Ltd..
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Mohammed, Muhiballah. 2023. Windows Forensics Analyst Field Guide: Engage in Proactive Cyber Defense Using Digital Forensics Techniques. Birmingham, UK: Packt Publishing Ltd.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Mohammed, Muhiballah. Windows Forensics Analyst Field Guide: Engage in Proactive Cyber Defense Using Digital Forensics Techniques Birmingham, UK: Packt Publishing Ltd, 2023.
Harvard Citation (style guide)Mohammed, M. (2023). Windows forensics analyst field guide: engage in proactive cyber defense using digital forensics techniques. 1st edn. Birmingham, UK: Packt Publishing Ltd.
MLA Citation, 9th Edition (style guide)Mohammed, Muhiballah. Windows Forensics Analyst Field Guide: Engage in Proactive Cyber Defense Using Digital Forensics Techniques 1st edition., Packt Publishing Ltd., 2023.
Staff View
Grouping Information
Grouped Work ID | c05de47b-b1da-75e4-51ce-83c3fae7a229-eng |
---|---|
Full title | windows forensics analyst field guide engage in proactive cyber defense using digital forensics techniques |
Author | mohammed muhiballah |
Grouping Category | book |
Last Update | 2025-01-24 12:33:29PM |
Last Indexed | 2025-04-11 03:28:33AM |
Book Cover Information
Image Source | google_title_author |
---|---|
First Loaded | Dec 27, 2024 |
Last Used | Apr 28, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:27:21 PM |
---|---|
Last File Modification Time | Dec 17, 2024 08:26:46 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 05246cam a22004337i 4500 | ||
---|---|---|---|
001 | on1407633628 | ||
003 | OCoLC | ||
005 | 20241217082502.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 231107s2023 enka o 001 0 eng d | ||
035 | |a (OCoLC)1407633628 | ||
037 | |a 9781803248479|b O'Reilly Media | ||
040 | |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCO|d EBLCP|d OCLCQ|d OCLCF | ||
049 | |a MAIN | ||
050 | 4 | |a HV8079.C65 | |
082 | 0 | 4 | |a 363.25/968|2 23/eng/20231107 |
100 | 1 | |a Mohammed, Muhiballah,|e author. | |
245 | 1 | 0 | |a Windows forensics analyst field guide :|b engage in proactive cyber defense using digital forensics techniques /|c Muhiballah Mohammed. |
250 | |a 1st edition. | ||
264 | 1 | |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2023. | |
300 | |a 1 online resource (318 pages) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Includes index. | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Windows OS Forensics and Lab Preparation -- Chapter 1: Introducing the Windows OS and Filesystems and Getting Prepar -- Technical requirements -- What is a Microsoft OS? -- The modern Windows OS and filesystems -- Windows XP -- Windows Vista -- Windows 7, 8 and 8.1 -- Windows 10 -- Digital forensics and common terminology -- What is digital forensics? -- Digital forensic terminology -- The process of digital forensics -- Digital evidence -- Windows VSS -- Preparing a lab environment | |
505 | 8 | |a Exploring the main components of Windows -- The kernel -- Windows processes -- Windows services -- Device drivers -- DLLs -- The registry -- The filesystem -- Investigation methodology -- Understanding Windows architecture -- Looking at the memory acquisition tools -- Using FTK Imager to capture memory -- WinPmem -- DumpIt -- Belkasoft RAM Capturer -- MAGNET RAM Capture -- Using Volatility to analyze memory dumps and plugins -- Volatility architecture -- Volatility plugins -- Volatility commands -- Identifying the profile -- The imageinfo plugin -- The process list and tree -- The netscan plugin | |
505 | 8 | |a The hivescan and hivelist plugins -- A brief overview of Volatility 3 -- Evidence collection and acquisition exercise -- Summary -- Chapter 4: The Windows Registry -- Technical requirements -- Windows Registry fundamentals -- Why do we care about the Windows Registry? -- Components of the Windows Registry -- Windows Registry hierarchy -- Windows Registry hives -- HKLM -- HKCU -- HKCR -- Windows Registry data types -- User registry hives -- NTUSER.DAT -- UsrClass.dat -- Windows Registry acquisition and analysis -- regedit.exe and reg.exe -- powershell.exe -- Windows Registry acquisition | |
505 | 8 | |a Windows Registry analysis tools -- Registry Explorer -- RegRipper -- Registry Viewer -- RECmd.exe -- Windows Registry forensic analysis exercises -- Summary -- Chapter 5: User Profiling Using the Windows Registry -- Profiling system details -- Identifying the OS version -- Identifying CurrentControlSet -- Validating the computer name -- Identifying time zones -- Identifying services -- Installed applications -- The PrefetchParameters subkey -- Network activities -- Autostart registry keys -- Profiling user activities -- SAM registry hive -- Domain and local user details -- NTUSER.DAT | |
520 | |a In this digitally driven era, safeguarding against relentless cyber threats is non-negotiable. This guide will enable you to enhance your skills as a digital forensic examiner by introducing you to cyber challenges that besiege modern entities. It will help you to understand the indispensable role adept digital forensic experts play in preventing these threats and equip you with proactive tools to defend against ever-evolving cyber onslaughts. The book begins by unveiling the intricacies of Windows operating systems and their foundational forensic artifacts, helping you master the art of streamlined investigative processes. From harnessing opensource tools for artifact collection to delving into advanced analysis, you'll develop the skills needed to excel as a seasoned forensic examiner. As you advance, you'll be able to effortlessly amass and dissect evidence to pinpoint the crux of issues. You'll also delve into memory forensics tailored for Windows OS, decipher patterns within user data, and log and untangle intricate artifacts such as emails and browser data. By the end of this book, you'll be able to robustly counter computer intrusions and breaches, untangle digital complexities with unwavering assurance, and stride confidently in the realm of digital forensics. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer crimes|x Investigation|v Handbooks, manuals, etc. | |
650 | 0 | |a Windows (Computer programs)|9 64134 | |
655 | 7 | |a Handbooks and manuals.|2 fast|0 (OCoLC)fst01423877|9 404624 | |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781803248479/?ar|x O'Reilly|z eBook |
938 | |a ProQuest Ebook Central|b EBLB|n EBL30973262 | ||
994 | |a 92|b VIA | ||
999 | |c 360056|d 360056 |