|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348107238 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2017 xx 086 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d UMI
|d S9I
|d OCLCO
|
019 |
|
|
|a 1019685174
|a 1362792641
|
020 |
|
|
|a 9781492029144
|q (electronic video)
|
020 |
|
|
|a 1492029149
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073549296
|
035 |
|
|
|a (OCoLC)1348107238
|z (OCoLC)1019685174
|z (OCoLC)1362792641
|
037 |
|
|
|a 9781492029144
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.M45
|
082 |
0 |
4 |
|a 025.04
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Forensic analysis of computer memory.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2017]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 26 min.)) :
|b sound, color.
|
306 |
|
|
|a 012600
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Ric Messier, presenter.
|
520 |
|
|
|a Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. In this course, entry- to intermediate-level IT professionals as well as law enforcement personnel can learn to use tools like Volatility and Rekall to acquire memory images from Windows, Linux, and macOS systems and examine them for signs of malware and other abnormalities. You'll see the techniques needed to conduct digital forensic work, such as identifying running processes, and more.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Memory management (Computer science)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Gestion mémoire (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
650 |
|
7 |
|a Memory management (Computer science)
|2 fast
|
655 |
|
2 |
|a Webcast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Messier, Ric,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492029144/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|