Cargando…

Forensic analysis of computer memory.

Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2017]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1348107238
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 221018s2017 xx 086 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d UMI  |d S9I  |d OCLCO 
019 |a 1019685174  |a 1362792641 
020 |a 9781492029144  |q (electronic video) 
020 |a 1492029149  |q (electronic video) 
029 1 |a AU@  |b 000073549296 
035 |a (OCoLC)1348107238  |z (OCoLC)1019685174  |z (OCoLC)1362792641 
037 |a 9781492029144  |b O'Reilly Media 
050 4 |a QA76.9.M45 
082 0 4 |a 025.04  |2 23/eng/20221018 
049 |a UAMI 
245 0 0 |a Forensic analysis of computer memory. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media, Inc.,  |c [2017] 
300 |a 1 online resource (1 video file (1 hr., 26 min.)) :  |b sound, color. 
306 |a 012600 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Ric Messier, presenter. 
520 |a Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. In this course, entry- to intermediate-level IT professionals as well as law enforcement personnel can learn to use tools like Volatility and Rekall to acquire memory images from Windows, Linux, and macOS systems and examine them for signs of malware and other abnormalities. You'll see the techniques needed to conduct digital forensic work, such as identifying running processes, and more. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Memory management (Computer science) 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Investigation. 
650 2 |a Computer Security 
650 6 |a Gestion mémoire (Informatique) 
650 6 |a Sécurité informatique. 
650 6 |a Piratage informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Memory management (Computer science)  |2 fast 
655 2 |a Webcast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Messier, Ric,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781492029144/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP