Windows Forensic Analysis DVD Toolkit / Edition 1

Windows Forensic Analysis DVD Toolkit / Edition 1

by Harlan Carvey
Pub. Date:
Elsevier Science & Technology Books
Select a Purchase Option (Older Edition)
  • purchase options

Temporarily Out of Stock Online


Windows Forensic Analysis DVD Toolkit / Edition 1

Windows Forensic Analysis DVD Toolkit, 2nd Edition, is a completely updated and expanded version of Harlan Carvey's best-selling forensics book on incident response and investigating cybercrime on Windows systems. With this book, you will learn how to analyze data during live and post-mortem investigations.

New to this edition is Forensic Analysis on a Budget, which collects freely available tools that are essential for small labs, state (or below) law enforcement, and educational organizations. The book also includes new pedagogical elements, Lessons from the Field, Case Studies, and War Stories that present real-life experiences by an expert in the trenches, making the material real and showing the why behind the how. The companion DVD contains significant, and unique, materials (movies, spreadsheet, code, etc.) not available anyplace else because they were created by the author.

This book will appeal to digital forensic investigators, IT security professionals, engineers, and system administrators as well as students and consultants.

  • Best-Selling Windows Digital Forensic book completely updated in this 2nd Edition
  • Learn how to Analyze Data During Live and Post-Mortem Investigations
  • DVD Includes Custom Tools, Updated Code, Movies, and Spreadsheets!

Product Details

ISBN-13: 9781597491563
Publisher: Elsevier Science & Technology Books
Publication date: 07/12/2007
Edition description: Older Edition
Pages: 416
Product dimensions: 6.90(w) x 8.90(h) x 1.20(d)

Table of Contents

Chapter 1. Live Response: Collecting Volatile Data
Chapter 2. Live Response: Analyzing Volatile Data
Chapter 3. Windows Memory Analysis
Chapter 4. Registry Analysis
Chapter 5. File Analysis
Chapter 6. Executable File Analysis
Chapter 7. Rootkits and Rootkit Detection
Chapter 8. Tying It All Together
Chapter 9. Forensic Analysis on a Budget

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews