Cantitate/Preț
Produs

Malware Forensics Field Guide for Linux Systems: Syngress Media

Autor James M. Aquilina, Cameron H. Malin, Eoghan Casey
en Limba Engleză Paperback – 31 ian 2013
Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more.
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.


  • A compendium of on-the-job tasks and checklists
  • Specific for Linux-based systems in which new malware is developed every day
  • Authors are world-renowned leaders in investigating and analyzing malicious code
Citește tot Restrânge

Preț: 39433 lei

Preț vechi: 49291 lei
-20% Nou

Puncte Express: 591

Preț estimativ în valută:
7547 7962$ 6289£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781597494700
ISBN-10: 1597494704
Pagini: 240
Dimensiuni: 151 x 228 x 27 mm
Greutate: 0.73 kg
Editura: Elsevier
Colecția Syngress Media
Seria Syngress Media

Locul publicării:United States

Public țintă

Email campaigns and annoucements through key associations (100k+), online ads on key sites, google ad words.

Cuprins

Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 2. Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems Chapter 4. Legal Considerations Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Linux System Chapter 6. Analysis of a Suspect Program Appendix A: Tool Glossary

Recenzii

"Malin…et al. demonstrate how to preserve volatile data on a Windows system during a malware incident and how to analyze physical and process memory dumps for malware artifacts. The practical handbook also provides formalized methodologies for conducting forensic examinations of Windows systems, profiling a suspect file, and identifying the nature and purpose of a suspect program."--Reference and Research Book News, February 2013