Cover image
Title page
Copyright
Dedication
Preface
Intended Audience
Organization of This Book
DVD Contents
Acknowledgments
About the Author
About the Technical Editor
Chapter 1. Analysis Concepts
Introduction
Analysis concepts
Setting up an analysis system
Summary
Chapter 2. Incident Preparation
Being prepared to respond
Data collection
Business models
Chapter 3. Volume Shadow Copies
What are “volume shadow copies”?
Live systems
Acquired images
Windows 8
Reference
Chapter 4. File Analysis
Information in This Chapter
MFT
Event logs
Recycle bin
Prefetch files
Scheduled tasks
Jump lists
Hibernation files
Application files
References
Chapter 5. Registry Analysis
Registry analysis
Chapter 6. Malware Detection
Malware Characteristics
Detecting Malware
Chapter 7. Timeline Analysis
Timelines
Creating Timelines
Case Study
Chapter 8. Correlating Artifacts
How-Tos
Chapter 9. Reporting
Goals
Case Notes
Reporting
Index