Full description not available
A**S
This is an amazing book. It is well written and straight to ...
This is an amazing book. It is well written and straight to the point. It covers every area of the windows operating system that you should expect to find evidence and paint a picture of what the bad guys did during a breach (or whatever else you are investigating). I would recommend this book 10 times over. There are plenty of screenshots and tutorials to review and the websites has data to practice on.
L**A
and can already conclude that this is a great book. Style of writing is excellent
I'm only three chapters in, and can already conclude that this is a great book. Style of writing is excellent. The author has a way of explaining that makes it feel as though you were actually in a live course. I would recommend this over and over again.
A**S
Don't let the name fool you. This one has much more to offer than the name might imply.
One of my new favorite forensic books. I strongly recommend this book for Windows forensics in general, not just for networks. Great explanations of various Windows artifacts, file systems, and much more. The network related topics are covered equally as well. The book is very well written in a way that is both understandable and engaging. This book can work for experts and those starting out as well. An excellent addition to anyone's forensic library.
P**5
Great book for learning network forensics!
Great book of you do computer forensics. I purchased this book to learn more about network forensics and the way it is written it is like taking a course. The Authors lay out the progression in a step by step building process and easy to understand. I recommend this book to anyone doing network security or computer forensics.
P**A
Excelente material de referencia
Muy útil como libro de consulta y referencia.
A**D
Four Stars
Good book, Needed it for class. Very informative and detailed on the aspects of Windows investigations
J**S
Do not get the Kindle version!!!
I'm still trying to figure out how you create a Kindle book that has no page numbers. This is a required textbook for one of my classes and it is impossible to try to "turn to page" making it difficult to try to follow along with the lecture. There is no rhyme or reason for this "location nonsense". Had I known that there were no page numbers in the Kindle book I would have just rented the actual book. I can't even make proper notes to go back and review certain pages. A book is a book and they should all have page numbers!
J**S
Five Stars
I love it. detailed, informative, and a great index to use as a reference.
D**D
Very good, even if you already know most of this stuff
It is very difficult to marry the disciplines of network / server administration and digital forensics, however this book manages it very well. It goes into enough technical detail so that an investigator will know what to look for and who to speak to, while not drowning them in to much unneeded detail. At the same time, it covers the investigative process in enough detail that an enthusiastic admin will avoid compromising evidence, while being able to communicate fluidly and clearly with the investigators.This is not a book for complete newcomers to either discipline, but more for those who have a basic understanding of one, and a deep understanding of the other.Well worth a look.
M**A
A must have
One of those books anyone who wills to enter the Microsoft Windows digital forensics world should thoroughly read from start to end to master the main the technical aspects involved in this particular scenario.
Trustpilot
1 day ago
1 month ago