Skip to main content

Books in Operating systems

1-10 of 48 results in All results

Executing Windows Command Line Investigations

  • 1st Edition
  • June 11, 2016
  • Chet Hosmer + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 2 6 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 2 7 1 - 2
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

OS X Incident Response

  • 1st Edition
  • May 6, 2016
  • Jaron Bradley
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 3 - 9
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations. Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones. Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.   For online source codes, please visit: https://github.com/jbradley89/osx_incident_response_scripting_and_analysis

Windows Registry Forensics

  • 2nd Edition
  • March 3, 2016
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 2 9 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 5 - 7
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

  • 1st Edition
  • December 10, 2015
  • Henry Dalziel + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 0 5 - 4
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Operating System Forensics

  • 1st Edition
  • November 12, 2015
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 4 9 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 6 3 - 4
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Thor's OS Xodus

  • 1st Edition
  • October 28, 2015
  • Timothy "Thor" Mullen
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 6 3 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 5 0 6 - 5
Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.

Computer System Organization

  • 1st Edition
  • June 25, 2014
  • Elliott I. Organick
  • Robert L. Ashenhurst
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 1 9 0 4 - 2
Computer System Organization: The B5700/B6700 Series focuses on the organization of the B5700/B6700 Series developed by Burroughs Corp. More specifically, it examines how computer systems can (or should) be organized to support, and hence make more efficient, the running of computer programs that evolve with characteristically similar information structures. Comprised of nine chapters, this book begins with a background on the development of the B5700/B6700 operating systems, paying particular attention to their hardware/software architecture. The discussion then turns to the block-structured processes involved in the B6700 job, which consists of a time-invariant algorithm and a time-varying data structure which is the record of execution of that algorithm. Subsequent chapters deal with the basic data structures for B6700 algorithms; task attributes and the creation and coordination of tasks; stack structure and stack ownership; and software interrupts. Storage control strategies as well as the pros and cons of B6700 are also considered, along with some hardware details of procedure entry and return and tasking. This monograph is intended for computer center directors, other computer professionals, and serious students in computer science who have an interest in the subject of computer organization.

The Real MCTS/MCITP Exam 70-620 Prep Kit

  • 1st Edition
  • April 18, 2011
  • Anthony Piltzecker
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 9 0 9 - 3
This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience in Tier 1 or Tier 2 phone support in an upper midsize organization or enterprise environment. MCTS candidates should have experience resolving issues concerning network connectivity, desktop operating systems, security, and applications. Their experience should also include addressing logon problems, performing password resets, and resolving most issues with desktop applications.

The Real MCTS/MCITP Exam 70-642 Prep Kit

  • 1st Edition
  • April 18, 2011
  • Brien Posey
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 0 3 6 - 5
This exam is designed to validate Windows Server 2008 network infrastructure configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642. This is a test for new certification seekers, not for those who are upgrading from Windows 2000/2003 MCSE/MCSA certification.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understand connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.

The Real MCTS/MCITP Exam 70-643 Prep Kit

  • 1st Edition
  • April 21, 2008
  • Brien Posey + 5 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 0 3 7 - 2
This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.