Skip to product information
1 of 1
Regular price £37.97 GBP
Regular price £54.99 GBP Sale price £37.97 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Windows Forensic Analysis Toolkit
Advanced Analysis Techniques for Windows 8

The best-selling digital forensics book now covers Windows 8!

Harlan Carvey (Author)

9780124171572, Elsevier Science

Paperback, published 8 May 2014

350 pages, 60 illustrations
23.5 x 19 x 2.3 cm, 0.73 kg

"... this book is well written and easy to read…has some material of interest to experts…"--Computing Reviews, Windows Forensic Analysis Toolkit, 4th Edition

"...technical detail is extensive here and those realworld examples mentioned earlier are worked through in intricate detail. You will definitely want to try this at home…" -Network Security, Nov 2014

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how.

The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7.

This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.

  1. Analysis Concepts
  2. Immediate Response
  3. Volume Shadow Copies
  4. File Analysis
  5. Registry Analysis
  6. Malware Detection
  7. Timeline Analysis
  8. Application Analysis
  9. Reporting

Subject Areas: Computer security [UR], Windows & variants [ULD], Operating systems [UL]

View full details