Windows Forensics: Understand Analysis Techniques for Your Windows First Edition 306388

Паперова книга
306388
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition - фото 1
2'200
Купити

Все про “Windows Forensics: Understand Analysis Techniques for Your Windows First Edition”

Від видавця

This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.

The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.

What Will You Learn
  • Understand Windows architecture
  • Recover deleted files from Windows and the recycle bin
  • Use volatility and PassMark volatility workbench
  • Utilize Windows PowerShell scripting for forensic applications
Who This Book Is For
Windows administrators, forensics practitioners, and those wanting to enter the field of digital forensics

About the Author
Dr. Chuck Easttom is the author of 39 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cyber security, a Ph.D. in Nanotechnology, a Ph.D. in computer science, and three master’s degrees.

Dr. William Butler is Vice President of Academic Affairs and Executive Director of the Center for Cybersecurity Research and Analysis (CCRA) at Capitol Technology University (Located in Laurel, Maryland). Before this appointment, Bill served as the Chair of Cybersecurity programs for eight years.

Jessica Phelan is a computer science graduate student at Vanderbilt University. She is currently doing research in natural language processing at the University of Texas at Austin.

Ramya Sai Bhagavatula is a Cybersecurity enthusiast and holds a Security+ Certification from CompTIA. She is currently working as an AI Engineer for a medical organization, Baylor Genetics, where she is using her AI expertise to work with genomic data to bring out valuable insights and predictions. She has previously worked for NASA as a Deep Learning Research Intern, where she developed deep learning models to effectively predict severe climate patterns. She was also a lead Data Analyst Intern at an arts organization, Houston Arts Alliance, where she was involved in analyzing in-depth patterns and providing recommendations for their future art grants. Through her dedication to continuous learning and professional development, she pursued her Master's in Data Analytics at UH and is currently pursuing her second Master's in Computer Science at Vanderbilt University. She is also 3x Microsoft Certified in AI and Data Engineering. She aspires for her future career path to involve Cybersecurity, Quantum Computing, and AI. In her free time, she loves to volunteer at local organizationsto raise awareness about Computer Science among underprivileged school students. She has also received the Presidential Volunteer Service Award for her volunteer services.

Sean Steuber has a BS in Engineering from University of Alabama, an MS in Computer Science from Vanderbilt University, and eight years of professional computer science experience.

Karely Rodriguez is a first-generation DACA recipient and a woman pursuing STEM. She earned a Bachelor’s of Science in Computer Science and minored in Mathematics at the University of Washington and has continued her education in achieving a Masters of Computer Science from Vanderbilt University.

Victoria Indy Balkissoon is working in the Naval Enterprise Research Data Science (N.E.R.D.S.) team at NAWCTSD Orlando where she currently works on developing software applications and data science solutions for the US NAVY. She is also currently pursuing a Master’s degree inComputer Science at Vanderbilt University.

Zehra Naseer has an MS in Ccmputer Science from Vanderbilt University.

Всі характеристики

Товар входить до категорії

  • Безкоштовна доставка Новою Поштою від 1'500,00 ₴
  • Безкоштовна доставка Укрпоштою від 200,00 ₴
  • Безкоштовна доставка Meest Поштою від 1'500,00 ₴
Персонально для вас
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
283888
Jean-Philippe Aumasson
1'900 ₴
The Hack Is Back: Techniques to Beat Hackers at Their Own Games 1st Edition
286458
Jesse VarsaloneChristopher Haller
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting 1st Edition
286418
Rafay Baloch
2'100 ₴
The Art of Mac Malware, Volume 2: Detecting Malicious Software
302607
Patrick Wardle
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Practical Purple Teaming: The Art of Collaborative Defense
303120
Alfie Champion
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Cryptography: Algorithms, Protocols, and Standards for Computer Security 1st Edition
306386
Zoubir Mammeri
3'800 ₴
Інші книги Apress
Beginning Spring Data: Data Access and Persistence for Spring Framework 6 and Boot 3 1st ed. Edition
259197
Andres Sacco
1'100 ₴
Pro Bash: Learn to Script and Program the GNU/Linux Shell 3rd ed. Edition
281505
Jayant Varma
1'700 ₴
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software First Edition
305809
Olga FilipovaRui Vilao
1'100 ₴
Frameworkless Front-End Development
255385
Francesco Strazzullo
985 ₴
Advanced interactive interfaces with Access: Building Interactive Interfaces with VBA First Edition
290270
Alessandro Grimaldi
1'400 ₴
Build Your Own IoT Platform. 2nd Ed.
244668
Anand Tamboli
1'700 ₴
Multi-Platform Graphics Programming with Kivy. Basic Analytical Programming for 2D, 3D, and Stereoscopic Design. 1st Ed.
244708
Mois?s Cywiak, David Cywiak
1'600 ₴
Pro Microservices in .NET 6. With Examples Using ASP.NET Core 6, MassTransit, and Kubernetes. 1st Ed.
244723
Sean Whitesell, Rob Richardson, Matthew D. Groves
1'700 ₴
Cloud-Native Microservices with Apache Pulsar. 1st Ed.
244672
Rahul Sharma, Mohammad Atyab
1'800 ₴
Kubernetes Fundamentals: A Step-by-Step Development and Interview Guide 1st ed. Edition
263210
Himanshu Agrawal
1'300 ₴