Contents
Part 1: Understanding and Exploiting Windows Networks
Chapter 1: Network Investigation Overview
Performing the Initial Vetting
Meeting with the Victim Organization
Understanding the Victim Network Information
Identifying and Preserving Evidence
Establishing Expectations and Responsibilities
Analyzing the Suspect’s Computers
Recognizing the Investigative Challenges of Microsoft Networks
Get Mastering Windows Network Forensics and Investigation, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.