您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Windows Forensic Analysis Including DVD Toolkit.pdf
  所属分类: Windows Server
  开发工具:
  文件大小: 4mb
  下载次数: 0
  上传时间: 2019-08-21
  提 供 者: drji*****
 详细说明: The purpose of this book is to address a need.One thing that many computer forensic examiners have noticed is an overreliance by investigators on what forensic analysis tools are telling them,without really understanding where this information is coming from or how it is being created or derived.The age of “Nintendo forensics”(i.e., loading an acquired image into a forensic analysis application and pushing a button) is over.As analysts and examiners,we can no longer expect to investigate a case in such a manner.Cybercrime has increased in sophistication,and investigators need to understand what artifacts are avail- able on a system,as well as how those artifacts are created and modified.With this level of knowledge,we come to understand that the absence of an artifact is itself an artifact.In addition,more and more presentations and material are available regarding anti-forensics,or techniques used to make forensic analysis more difficult.Moreover,there have been presentations at major conferences that discuss the anti-forensic technique of using the forensic analysts’training and tools against them.This book is intended to address the need for a more detailed,granular level of understanding.It attempts not only to demonstrate what information is available to the investigator on both a live Windows system and in an acquired image but also to provide information on how to locate additional artifacts that may be of interest. My primary reason for writing this book has been so that I can give back to a community and field of endeavor that has given so much to me.Since I started in the information security field over 10 years ago (prior to that,I was in the military and involved in physical and communications security),I’ve met a lot of great people and done a lot of really interesting things.Over time, people have shared things with me that have been extremely helpful,and some xix Preface 423_Win_Foren_Pre.qxd 3/26/07 12:44 PM Page xix of those things have served as stepping stones into further research.Some of that research has found its way into presentations I’ve given at various confer- ences,and from there,others have asked questions and provided insight and answers that have helped push that research forward.The repeated exchanging of information and engaging in discussion have moved the interest and the level of knowledge forward,thus advancing the field. This book is intended to address the technical aspects of collecting and ana- lyzing data during both live and post-mortem investigations of Windows sys- tems.It does not cover everything that could possibly be addressed.There is still considerable room for research in several areas,and a great deal of information needs to be catalogued.My hope is that this book will awaken the reader to the possibilities and opportunities that exist within Windows systems for a more comprehensive investigation and analysis. Intended Audience This book focuses on a fairly narrow technical area,Windows forensic analysis, but it’s intended for anyone who does,might do,or is thinking about per- forming forensic analysis of Windows systems.This book will be a useful refer- ence for many,and my hope is that any readers who initially feel that the book is over their heads or beyond their technical reach will use the material they find as a starting point and a basis for questions and further study.When I started writing this book,it was not intended to be a second or follow-on edi- tion to my first book,Windows Forensics and Incident Recovery,which was pub- lished by Addison-Wesley in July 2004.Rather,my intention was to move away from a more general focus and provide a resource not only for myself but also for others working in the computer forensic analysis field. In writing this book,my goal was to provide a resource for forensic ana- lysts,investigators,and incident responders.My hope is to provide not only useful material for those currently performing forensic investigations but also insight to system administrators who have been faced with incident response activities and have been left wondering,“What should I have done?”On that front,my hope is that we can eventually move away from the misconception that wiping the hard drive and reinstalling the operating system from clean media are acceptable resolutions to an incident.Even updating the patches on the system does not address configuration issues and in many cases will result in reinfection or the system being compromised all over again.
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索:
 输入关键字,在本站1000多万海量源码库中尽情搜索: