Skip to Main Content
Cyber Forensics, 2nd Edition
book

Cyber Forensics, 2nd Edition

by Albert Marcella Jr., Doug Menendez
December 2010
Intermediate to advanced content levelIntermediate to advanced
528 pages
18h 51m
English
Auerbach Publications
Content preview from Cyber Forensics, 2nd Edition
148 Cyber Forensics Field Manual, Second Edition
For incoming connections, the operating system typically indicates which resources are
being used, such as fi le shares and printers. Most operating systems can also provide a list of
the ports and IP addresses at which the system is listening for connections.
Running Processes—Processes are the programs that are currently executing on a computer.
Processes include services off ered by the operating system and applications run by adminis-
trators and users. Most operating systems off er ways to view a list of the currently running
processes.  is list can be studied to determine the services that are active on the system, such
as a Web server, and the programs that individual users are runni ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen
Digital Forensics

Digital Forensics

John Sammons
Cyber Security and Digital Forensics

Cyber Security and Digital Forensics

Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le

Publisher Resources

ISBN: 9781439848234