Malware Forensics Field Guide for Linux Systems: Syngress Media
Autor James M. Aquilina, Cameron H. Malin, Eoghan Caseyen Limba Engleză Paperback – 31 ian 2013
The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more.
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
- A compendium of on-the-job tasks and checklists
- Specific for Linux-based systems in which new malware is developed every day
- Authors are world-renowned leaders in investigating and analyzing malicious code
Preț: 394.33 lei
Preț vechi: 492.91 lei
-20% Nou
Puncte Express: 591
Preț estimativ în valută:
75.47€ • 79.62$ • 62.89£
75.47€ • 79.62$ • 62.89£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597494700
ISBN-10: 1597494704
Pagini: 240
Dimensiuni: 151 x 228 x 27 mm
Greutate: 0.73 kg
Editura: Elsevier
Colecția Syngress Media
Seria Syngress Media
Locul publicării:United States
ISBN-10: 1597494704
Pagini: 240
Dimensiuni: 151 x 228 x 27 mm
Greutate: 0.73 kg
Editura: Elsevier
Colecția Syngress Media
Seria Syngress Media
Locul publicării:United States
Public țintă
Email campaigns and annoucements through key associations (100k+), online ads on key sites, google ad words.Cuprins
Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 2. Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems Chapter 4. Legal Considerations Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Linux System Chapter 6. Analysis of a Suspect Program Appendix A: Tool Glossary
Recenzii
"Malin…et al. demonstrate how to preserve volatile data on a Windows system during a malware incident and how to analyze physical and process memory dumps for malware artifacts. The practical handbook also provides formalized methodologies for conducting forensic examinations of Windows systems, profiling a suspect file, and identifying the nature and purpose of a suspect program."--Reference and Research Book News, February 2013