Loading…

Malware forensics : investigating and analyzing malicious code /

'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Aquilina, James M.
Other Authors: Casey, Eoghan, Malin, Cameron H.
Format: Electronic eBook
Language:Inglés
Published: Burlington, MA : Syngress Pub., �2008.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
  • Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
  • Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
  • Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
  • Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
  • Ch. 6. Legal Considerations
  • Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System
  • Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
  • Ch. 9. Analysis of a Suspect Program: Windows
  • Ch. 10. Analysis of a Suspect Program: Linux.