Windows registry forensics: advanced digital forensic analysis of the Windows registry
Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are inclu...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress is an imprint of Elsevier
2016
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | DE-860 URL des Erstveröffentlichers |
Zusammenfassung: | Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource |
ISBN: | 9780128033357 0128033355 012803291X 9780128032916 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126989 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2016 xx o|||| 00||| eng d | ||
020 | |a 9780128033357 |9 978-0-12-803335-7 | ||
020 | |a 0128033355 |9 0-12-803335-5 | ||
020 | |a 012803291X |9 0-12-803291-X | ||
020 | |a 9780128032916 |9 978-0-12-803291-6 | ||
035 | |a (ZDB-33-ESD)ocn944186046 | ||
035 | |a (OCoLC)944186046 | ||
035 | |a (DE-599)BVBBV046126989 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.16/8 |2 23 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
100 | 1 | |a Carvey, Harlan A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Windows registry forensics |b advanced digital forensic analysis of the Windows registry |c Harlan Carvey |
250 | |a Second edition | ||
264 | 1 | |a Cambridge, MA |b Syngress is an imprint of Elsevier |c 2016 | |
264 | 4 | |c © 2016 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 7 | |a Microsoft Windows (Computer file) |2 fast | |
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 7 | |a Component software |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer crimes |x Investigation |x Methodology | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Component software | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128032916 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128032916 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-33-ESD | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031507443 | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128032916 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1825766772170555392 |
---|---|
adam_text | |
any_adam_object | |
author | Carvey, Harlan A. |
author_facet | Carvey, Harlan A. |
author_role | aut |
author_sort | Carvey, Harlan A. |
author_variant | h a c ha hac |
building | Verbundindex |
bvnumber | BV046126989 |
classification_rvk | ST 261 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn944186046 (OCoLC)944186046 (DE-599)BVBBV046126989 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV046126989</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2016 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128033357</subfield><subfield code="9">978-0-12-803335-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128033355</subfield><subfield code="9">0-12-803335-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012803291X</subfield><subfield code="9">0-12-803291-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128032916</subfield><subfield code="9">978-0-12-803291-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn944186046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)944186046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126989</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carvey, Harlan A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Windows registry forensics</subfield><subfield code="b">advanced digital forensic analysis of the Windows registry</subfield><subfield code="c">Harlan Carvey</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress is an imprint of Elsevier</subfield><subfield code="c">2016</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Component software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="x">Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Component software</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128032916</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128032916</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031507443</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128032916</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126989 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:01:18Z |
institution | BVB |
isbn | 9780128033357 0128033355 012803291X 9780128032916 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031507443 |
oclc_num | 944186046 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Syngress is an imprint of Elsevier |
record_format | marc |
spelling | Carvey, Harlan A. Verfasser aut Windows registry forensics advanced digital forensic analysis of the Windows registry Harlan Carvey Second edition Cambridge, MA Syngress is an imprint of Elsevier 2016 © 2016 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. Named a 2011 Best Digital Forens Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast SOCIAL SCIENCE / Criminology bisacsh Component software fast Computer networks / Security measures fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer crimes Investigation Methodology Computer networks Security measures Computer security Component software Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Datensicherung (DE-588)4011144-1 s Rechnernetz (DE-588)4070085-9 s 1\p DE-604 Computerforensik (DE-588)4774034-6 s 2\p DE-604 Computerkriminalität (DE-588)4010452-7 s 3\p DE-604 Erscheint auch als Druck-Ausgabe 9780128032916 http://www.sciencedirect.com/science/book/9780128032916 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Carvey, Harlan A. Windows registry forensics advanced digital forensic analysis of the Windows registry Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast SOCIAL SCIENCE / Criminology bisacsh Component software fast Computer networks / Security measures fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer crimes Investigation Methodology Computer networks Security measures Computer security Component software Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4010452-7 (DE-588)4774034-6 |
title | Windows registry forensics advanced digital forensic analysis of the Windows registry |
title_auth | Windows registry forensics advanced digital forensic analysis of the Windows registry |
title_exact_search | Windows registry forensics advanced digital forensic analysis of the Windows registry |
title_full | Windows registry forensics advanced digital forensic analysis of the Windows registry Harlan Carvey |
title_fullStr | Windows registry forensics advanced digital forensic analysis of the Windows registry Harlan Carvey |
title_full_unstemmed | Windows registry forensics advanced digital forensic analysis of the Windows registry Harlan Carvey |
title_short | Windows registry forensics |
title_sort | windows registry forensics advanced digital forensic analysis of the windows registry |
title_sub | advanced digital forensic analysis of the Windows registry |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast SOCIAL SCIENCE / Criminology bisacsh Component software fast Computer networks / Security measures fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer crimes Investigation Methodology Computer networks Security measures Computer security Component software Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerkriminalität (DE-588)4010452-7 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Microsoft Windows (Computer file) SOCIAL SCIENCE / Criminology Component software Computer networks / Security measures Computer security Operating systems (Computers) Computer crimes Investigation Methodology Computer networks Security measures Datensicherung Rechnernetz Computerkriminalität Computerforensik |
url | http://www.sciencedirect.com/science/book/9780128032916 |
work_keys_str_mv | AT carveyharlana windowsregistryforensicsadvanceddigitalforensicanalysisofthewindowsregistry |