Buying Options

Kindle Price: $75.67
includes tax, if applicable

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

<Embed>

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer – no Kindle device required. Learn more

Read instantly on your browser with Kindle Cloud Reader.

Using your mobile phone camera, scan the code below and download the Kindle app.

QR code to download the Kindle App

Enter your mobile phone or email address

Processing your request...

By pressing ‘Send link’, you agree to Amazon's Conditions of Use.

You consent to receive an automated text message from or on behalf of Amazon about the Kindle App at your mobile number above. Consent is not a condition of any purchase. Message and data rates may apply.

Mastering Windows Network Forensics and Investigation by [Steve Anson, Steve Bunting, Ryan Johnson, Scott Pearson]

Follow the Authors

See all
Something went wrong. Please try your request again later.


Mastering Windows Network Forensics and Investigation 2nd Edition, Kindle Edition

4.5 out of 5 stars 16 ratings

Amazon Price
New from Used from
Kindle
$75.67
Due to its large file size, this book may take longer to download

New from the author of The Girl from Munich
From Australia’s bestselling author comes the story of one woman’s determination to find her place in a world that men are threatening to tear apart. Shop now.

Product description

From the Publisher

Steve Anson, CISSP, EnCE, is the cofounder of Forward Discovery. He has previously served as a police officer, FBI High Tech Crimes Task Force agent, Special Agent with the U.S. DoD, and an instructor with the U.S. State Department Antiterrorism Assistance Program (ATA). He has trained hundreds of law enforcement officers around the world in techniques of digital forensics and investigation. Steve Bunting, EnCE, CCFT, has over 35 years of experience in law enforcement, and his background in computer forensics is extensive. He has conducted computer forensic examinations for numerous local, state, and federal agencies on a variety of cases, as well as testified in court as a computer forensics expert. He has taught computer forensics courses for Guidance Software and is currently a Senior Forensic Consultant with Forward Discovery. Ryan Johnson, DFCP, CFCE, EnCE, SCERS, is a Senior Forensic Consultant with Forward Discovery. He was a digital forensics examiner for the Durham, NC, police and a Media Exploitation Analyst with the U.S. Army. He is an instructor and developer with the ATA. Scott Pearson has trained law enforcement entities, military personnel, and network/system administrators in more than 20 countries for the ATA. He is also a certifying Instructor on the Cellebrite UFED Logical and Physical Analyzer Mobile Device Forensics tool and has served as an instructor for the DoD Computer Investigations Training Academy. --This text refers to the paperback edition.

From the Inside Flap

Learn How to Conduct a Complete Computer Forensic Investigation

This professional guide teaches law enforcement personnel, prosecutors, and corporate investigators how to investigate crimes involving Windows computers and Windows networks. A top team of forensic experts details how and why Windows networks are targeted, shows you how to analyze computers and computer logs, explains chain of custody, and covers such tricky topics as how to gather accurate testimony from employees in politically charged corporate settings.

From recognizing high-tech criminal activity to presenting evidence in a way that juries and judges understand, this book thoroughly covers the range of skills, standards, and step-by-step procedures you need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.

Coverage includes:

  • Responding to a reported computer intrusion
  • Understanding how attackers exploit Windows networks
  • Deciphering Windows ports, services, file systems, and the registry
  • Examining suspects' computers and entire networks
  • Analyzing event logs and data using live analysis techniques
  • Exploring new complexities from cloud computing and virtualization

Investigate Computer Crimes in Windows Environments

Fully Updated for Windows Server 2008 and Windows 7

Discover How to Locate and Analyze an Attacker's Tools

Learn Detailed Windows Event Log Analysis

--This text refers to the paperback edition.

Product details

  • ASIN ‏ : ‎ B008RO92J6
  • Publisher ‏ : ‎ Sybex; 2 edition (30 July 2012)
  • Language ‏ : ‎ English
  • File size ‏ : ‎ 68599 KB
  • Text-to-Speech ‏ : ‎ Enabled
  • Screen Reader ‏ : ‎ Supported
  • Enhanced typesetting ‏ : ‎ Enabled
  • X-Ray ‏ : ‎ Not Enabled
  • Word Wise ‏ : ‎ Not Enabled
  • Print length ‏ : ‎ 662 pages
  • Page numbers source ISBN ‏ : ‎ 1118163826
  • Customer Reviews:
    4.5 out of 5 stars 16 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.5 out of 5 stars
4.5 out of 5
16 global ratings
5 star
75%
4 star
16%
3 star 0% (0%) 0%
2 star 0% (0%) 0%
1 star
9%

Review this product

Share your thoughts with other customers

Top reviews from Australia

There are 0 reviews and 0 ratings from Australia

Top reviews from other countries

DD
5.0 out of 5 stars Very good, even if you already know most of this stuff
Reviewed in the United Kingdom on 15 February 2013
Verified Purchase
Mario Guerra
5.0 out of 5 stars A must have
Reviewed in Spain on 28 June 2014
Verified Purchase
Pitt1965
5.0 out of 5 stars Great book for learning network forensics!
Reviewed in the United States on 9 September 2015
Verified Purchase
One person found this helpful
Report abuse
Pablo Zurita
5.0 out of 5 stars Excelente material de referencia
Reviewed in the United States on 14 March 2020
Verified Purchase
anonymous
5.0 out of 5 stars Don't let the name fool you. This one has much more to offer than the name might imply.
Reviewed in the United States on 23 November 2012
Verified Purchase
4 people found this helpful
Report abuse