Text
Mastering Windows network forensics and investigation
Table of contents
Part 1 Understanding and Exploiting Windows Networks 1
Chapter 1 Network Investigation Overview 3
Chapter 2 The Microsoft Network Structure 25
Chapter 3 Beyond the Windows GUI 63
Chapter 4 Windows Password Issues 85
Chapter 5 Windows Ports and Services 137
Part 2 Analyzing the Computer 157
Chapter 6 Live-Analysis Techniques 159
Chapter 7 Windows Filesystems 179
Chapter 8 The Registry Structure 215
Chapter 9 Registry Evidence 257
Chapter 10 Introduction to Malware 325
Part 3 Analyzing the Logs 349
Chapter 11 Text-Based Logs 351
Chapter 12 Windows Event Logs 381
Chapter 13 Logon and Account Logon Events 419
Chapter 14 Other Audit Events 463
Chapter 15 Forensic Analysis of Event Logs 505
Part 4 Results, the Cloud, and Virtualization 537
Chapter 16 Presenting the Results 539
Chapter 17 The Challenges of Cloud Computing and Virtualization 565
Part 5 Appendices 597
Appendix A The Bottom Line 599
Appendix B Test Environments 633
Index 647
No other version available