Investigating Windows Systems helps readers discover the detailed tools they will need to perform research. It provides a walk-through of the analysis process, with descriptions of thought processes and an analysis of decisions made along the way. This must-have guide on the fields of digital forensic analysis and incident response doesn't simply put the pieces out to be analyzed and assembled. Instead, it presents a full understanding of what the final product is supposed to look like, providing a walk-through of the entire process, with descriptions of thought processes and an analysis and explanation of decisions made along the way.
- Provides the reader with a detailed walk-through of the analysis process, with decision points along the way, assisting the user in understanding the resulting data
- Coverage will include malware detection, user activity, and how to set up a testing environment
- Written at a beginner to intermediate level for anyone engaging in the field of digital forensic analysis and incident response
Harlan Carvey is a senior information security researcher with the Dell SecureWorks Counter Threat Unit - Special Ops (CTU-SO) team, where his efforts are focused on targeted threat hunting, response, and research. He continues to maintain a passion and focus in analyzing Windows systems, and in particular, the Windows Registry.
Harlan is an accomplished author, public speaker, and open source tool author. He dabbles in other activities, including home brewing and horseback riding. As a result, he has become quite adept at backing up and parking a horse trailer.
Harlan earned a bachelor's degree in electrical engineering from the Virginia Military Institute, and a master's degree in the same discipline from the Naval Postgraduate School. He served in the United States Marine Corps, achieving the rank of captain before departing the service. He resides in Northern Virginia with his family.