プライム無料体験をお試しいただけます
プライム無料体験で、この注文から無料配送特典をご利用いただけます。
非会員 | プライム会員 | |
---|---|---|
通常配送 | ¥410 - ¥450* | 無料 |
お急ぎ便 | ¥510 - ¥550 | |
お届け日時指定便 | ¥510 - ¥650 |
*Amazon.co.jp発送商品の注文額 ¥3,500以上は非会員も無料
無料体験はいつでもキャンセルできます。30日のプライム無料体験をぜひお試しください。
¥12,103¥12,103 税込
発送元: Amazon.co.jp 販売者: Amazon.co.jp
¥4,380¥4,380 税込
ポイント: 44pt
(1%)
配送料 ¥430 6月15日-26日にお届け
発送元: worldbooksjapan 販売者: worldbooksjapan
無料のKindleアプリをダウンロードして、スマートフォン、タブレット、またはコンピューターで今すぐKindle本を読むことができます。Kindleデバイスは必要ありません。
ウェブ版Kindleなら、お使いのブラウザですぐにお読みいただけます。
携帯電話のカメラを使用する - 以下のコードをスキャンし、Kindleアプリをダウンロードしてください。
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry ペーパーバック – 2011/2/7
この商品には新版があります:
購入オプションとあわせ買い
Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry.
Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book.
This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc.
- Named a 2011 Best Digital Forensics Book by InfoSec Reviews
- Packed with real-world examples using freely available open source tools
- Deep explanation and understanding of the Windows Registry – the most difficult part of Windows to analyze forensically
- Includes a CD containing code and author-created tools discussed in the book
- 本の長さ248ページ
- 言語英語
- 出版社Syngress
- 発売日2011/2/7
- 寸法18.8 x 2.29 x 23.11 cm
- ISBN-109781597495806
- ISBN-13978-1597495806
商品の説明
レビュー
"As an experienced security architect I’ve been reasonably familiar with the "windows registry" for many years and have frequently used regedit to look at various keys and values (and have sometimes even taken the dangerous steps of changing values!). In my vast library I also have a number of books describing the registry, although I have to say they are somewhat ancient. However, it was not until I read this book I really appreciated the vast amount of information contained in the various registry files. Indeed I was not aware of forensic importance of these files." --Best Digital Forensics Book in InfoSecReviews Book Awards "It is no exaggeration to say that nearly everything that happens on a Windows system involves the registry―which makes effective examination of the registry absolutely fundamental to good Windows forensics. By devoting a whole book to this critical Windows artifact, Harlan has delivered a much needed resource to everyone doing forensics investigations of Windows systems. What I appreciate about this book, however, is that it is much more than a mere compilation of registry keys important to forensics investigation. This is a book about how to examine the registry, and it is a good one." --Troy Larson, Principal Forensic Program Manager, Network Security Investigations, Microsoft "Windows Registry Forensics provides extensive proof that registry examination is critical to every digital forensic case. Harlan Carvey steps the reader through critical analysis techniques recovering key evidence of activity of suspect user accounts or intrusion-based malware. Using his extensive experience and research, Harlan's case studies provide behind-the-scenes details that enable every analyst to utilize these techniques immediately in their own investigations. This book is a must have reference for current forensic knowledge of the Microsoft Registry Windows XP through Windows 7 and should become core knowledge for any serious digital forensic investigator." --Rob Lee, SANS Institute "Useful to beginning and intermediate practitioners, but even advanced examiners may fi nd registry information here that they were not previously aware of. Anyone working in digital forensics or incident response who has not made registry examination integral to their process must read and absorb this book. The information is vital to Windows examinations…. Windows Registry Forensics easily succeeds in its mission to convey the value of integrating registry examination into the forensic process. It provides valuable information relevant to a wide range of investigations. And Mr. Carvey’s conversational writing style makes the book easy to read...." --Digital Forensics Magazine "This guide to digital forensics on computers running the Microsoft Windows operating system provides detailed information on the analysis of the Windows registry to detect intrusion and document user actions. The work is divided into three sections beginning with an overview of the registry structure and following with a discussion of registry analysis tools and concluding with an in depth case study of a registry forensics project. Each section includes answers to frequently asked questions and a selection of references for further reading. Illustrations, code examples, tips and warning notes are provided throughout and an accompanying CD-ROM provides copies of registry analysis tools created by the author. Carvey is a computer forensics consultant." --Book News, Reference & Research "As an experienced security architect I’ve been reasonably familiar with the ‘windows registry’ for many years and have frequently used regedit to look at various keys and values (and have sometimes even taken the dangerous steps of changing values!). In my vast library I also have a number of books describing the registry, although I have to say they are somewhat ancient. However it was not until I read this book I really appreciated the vast amount of information contained in the various registry files. Indeed I was not aware of forensics importance of these files….. An extremely useful book to a forensics investigator, even an experienced one. I would not hesitate in recommending this book to anyone…" --InfoSecReviews.com
著者について
登録情報
- ASIN : 1597495808
- 出版社 : Syngress; 第1版 (2011/2/7)
- 発売日 : 2011/2/7
- 言語 : 英語
- ペーパーバック : 248ページ
- ISBN-10 : 9781597495806
- ISBN-13 : 978-1597495806
- 寸法 : 18.8 x 2.29 x 23.11 cm
- カスタマーレビュー:
著者について
著者の本をもっと発見したり、よく似た著者を見つけたり、著者のブログを読んだりしましょう
他の国からのトップレビュー
With Harlan Carvey, computer forensics is science predicated upon art - and hard work.
Few people outside this small craft are equipped to appreciate what computer forensics is - and I am not about to attempt explaining the full scope of computer forensics in this limited space.
Suffice it to say that a primary objective of computer forensics is the hunt for data.
Those who do this for a living know that no two situations are the same and thus practitioners must have broad knowledge of operating systems, particularly Microsoft Windows.
And working in the innards of Windows isn't for sissies.
Harlan Carvey is among the few practitioners who write for the trade. He is an accomplished Perl scripter and one of his tools, RegRipper, is widely used.
Here, Harlan attempts to explain how to conduct forensic analysis of the Windows Registry. The Registry is never-never land for most of the computer forensic "experts" I've known. Not long ago, I assisted a client in obtaining a large settlement because the opposing expert paid no attention to the Registry and I did.
Carvey explains the Registry in a systematic manner. He begins with an overview of Registry analysis which I think Is too short, but in fact is probably going to be overkill for most because they simply don't get it. He moves on to Registry analysis tools and then case studies. Overall, for those with little or no understanding of Windows Registry, it is probably a good introduction. I remember way back when the Registry was introduced and then had its functionality extended in Windows 95. Little information was available from Microsoft and those of us in the field had to learn Registry the hard way. Today, people like Harlan are developing tools for Registry analysis and writing books explaining how to do it. Pretty neat.
Harlan has done his homework in gathering information on the Registry and he obviously understands it well enough to write fine tool with which to analyze it.
Yet, I would say that this book is not suitable for beginners in computer forensics because there is so much else to know about operating systems and file systems before you can grasp what the Registry is all about. By the same token, the book will provide only tidbits for those who have been doing serious computer forensics for several years.
Carvey's writing style is smooth, though the editors at Syngress might consider taking a refresher course.
Overall, despite the high price of the book, I think any serious practitioner of computer forensics would realize some benefit from reading this book.
Jerry