Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Windows Forensics
CASE STUDY: THE MYSTERY TYPIST
Chapter 2: Processing the Digital Crime Scene
CASE STUDY: UNAUTHORIZED NETWORK DEVICE
CASE STUDY: REMOTE CORRUPTION
EVIDENCE COLLECTION KIT
CASE STUDY: ELECTRONIC DEVICE MISUSE
SHUTDOWN, UNPLUG, OR ANALYZE LIVE
EVIDENCE STORAGE
Chapter 3: Windows Forensics Basics
THE WORM DID IT!
WRITE BLOCKING
FLOPPY DISK REPAIR
TAPE BACKUP METHODS
CD/DVD REPAIR
CASE STUDY: MISSING USB KEY
HARD DISK PASSWORDS
RAID ARRAYS
Chapter 4: Partitions and File Systems
WINDOWS BOOT PROCESS
FIXING THE MBR
SECURE DATA WIPING
ALTERNATE DATA STREAMS
BYPASSING NTFS PERMISSIONS
SYMMETRIC AND PUBLIC KEY ENCRYPTION
CASE STUDY: FTP HACKER
Chapter 5: Directory Structure and Special Files
WINDOWS STARTUP INFORMATION
ENVIRONMENT VARIABLES
CASE STUDY: ALTERED HOSTS FILE
SECURITY IDENTIFIERS
Chapter 6: The Registry
WINDOWS REGISTRY FILE LOCATIONS
CASE STUDY: CD BURNING
AUTOSTART LOCATIONS
Chapter 8: Live System Analysis
ORDER OF VOLATILITY
WIRELESS MONITORING
NETWORK TRAFFIC RECONSTRUCTION
SNIFFER CABLE CONSTRUCTION
ROOTKITS
Chapter 9: Forensic Duplication
WRITE BLOCKING
ENCASE ENTERPRISE
CASE STUDY: MASS ACQUISITION
Chapter 10: File System Analysis
REGULAR EXPRESSIONS
HASH ALGORITHM SECURITY
STEGANOGRAPHY
FINDING COMPRESSED FILES
Chapter 11: Log File Analysis
EVENT LOG CORRUPTION
WINDOWS XP FIREWALL LOGS
HTTP LOG SAMPLE
CROSS SITE SCRIPTING AND SQL INJECTION
CASE STUDY: PHISHING
Chapter 12: Internet Usage Analysis
INTERNET-ACCEPTABLE USAGE POLICY
Chapter 13: Email Investigations
CASE STUDY: INAPPROPRIATE EMAIL USAGE
USENET AND NNTP
CASE STUDY: ACCIDENTAL DISCLOSURE
EMAIL HEADERS
Previous page
Table of content
Windows Forensics: The Field Guide for Corporate Computer Investigations
ISBN: 0470038624
EAN: 2147483647
Year: 2006
Pages: 71
Authors:
Chad Steel
BUY ON AMAZON
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
Text Controls
Tables
JFace Wizards
Programming OLE in Windows
FileMaker Pro 8: The Missing Manual
Navigating Your Database
Building a New Database
Creating a Layout from Scratch
Replacing Data Using a Calculation
Script Debugger
Building Web Applications with UML (2nd Edition)
Influences of Architecture
The Vision
Analysis Model Structure
Summary
Summary
C++ How to Program (5th Edition)
Machine Languages, Assembly Languages and High-Level Languages
Introduction
break and continue Statements
Passing Arrays to Functions
J.1. Introduction
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
The Ethics of Persuasive Technology
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Setting Up a Drawing
Gaining Drawing Strategies: Part 1
Gaining Drawing Strategies: Part 2
Grouping Objects into Blocks
Working with Hatches and Fills
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies