|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn794596886 |
003 |
OCoLC |
005 |
20231117044722.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120601s2012 mau ob 001 0 eng d |
010 |
|
|
|a 2012019134
|
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d E7B
|d CDX
|d DEBSZ
|d YDXCP
|d UMI
|d COO
|d OCLCQ
|d OCLCA
|d OCLCF
|d OCLCQ
|d DKDLA
|d OCLCQ
|d Z5A
|d ORU
|d NLE
|d LIV
|d OCLCQ
|d OCL
|d OCLCO
|d OCLCA
|d U3W
|d D6H
|d CEF
|d OCLCA
|d WYU
|d UAB
|d AUD
|d LEAUB
|d AU@
|d UKAHL
|d VT2
|d ERF
|d KMS
|d OCLCQ
|d TUHNV
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 826867539
|a 859884320
|a 1065880191
|a 1103258722
|a 1112518756
|a 1129337170
|a 1153034493
|a 1243610132
|
020 |
|
|
|a 9781597494724
|q (electronic bk.)
|
020 |
|
|
|a 1597494720
|q (electronic bk.)
|
020 |
|
|
|a 9781597494731
|
020 |
|
|
|a 1597494739
|
035 |
|
|
|a (OCoLC)794596886
|z (OCoLC)826867539
|z (OCoLC)859884320
|z (OCoLC)1065880191
|z (OCoLC)1103258722
|z (OCoLC)1112518756
|z (OCoLC)1129337170
|z (OCoLC)1153034493
|z (OCoLC)1243610132
|
050 |
|
4 |
|a QA76.76.C68
|b M322 2012
|
082 |
0 |
4 |
|a 005.8/4
|2 23
|
100 |
1 |
|
|a Malin, Cameron H.
|
245 |
1 |
0 |
|a Malware forensics field guide for Windows systems :
|b digital forensics field guides /
|c Cameron H. Malin, Eoghan Casey, James M. Aquilina.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c �2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Malware incident response -- Memory forensics -- Post-mortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.
|
588 |
0 |
|
|a Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012).
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Computer viruses.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Logiciels malveillants.
|0 (CaQQLa)201-0367821
|
650 |
|
6 |
|a Virus informatiques.
|0 (CaQQLa)201-0184374
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Criminalit�e informatique
|x Enqu�etes.
|0 (CaQQLa)201-0278229
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|0 (OCoLC)fst01367862
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer viruses
|2 fast
|0 (OCoLC)fst00872684
|
650 |
|
7 |
|a Malware (Computer software)
|2 fast
|0 (OCoLC)fst01748230
|
700 |
1 |
|
|a Casey, Eoghan.
|
700 |
1 |
|
|a Aquilina, James M.
|
776 |
0 |
8 |
|i Print version:
|a Malin, Cameron H.
|t Malware forensics field guide for Windows systems.
|d Waltham, MA : Syngress, �2012. 4803161
|z 9781597494724
|w (DLC) 2012019134
|w (OCoLC)794227977
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597494724
|z Texto completo
|