Buch, Englisch, 616 Seiten, Format (B × H): 153 mm x 228 mm, Gewicht: 892 g
Digital Forensics Field Guides
Buch, Englisch, 616 Seiten, Format (B × H): 153 mm x 228 mm, Gewicht: 892 g
ISBN: 978-1-59749-470-0
Verlag: Syngress Media,U.S.
Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
- A compendium of on-the-job tasks and checklists
- Specific for Linux-based systems in which new malware is developed every day
- Authors are world-renowned leaders in investigating and analyzing malicious code
Zielgruppe
Email campaigns and annoucements through key associations (100k+), online ads on key sites, google ad words.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Prozedurale Programmierung
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 2. Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems Chapter 4. Legal Considerations Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Linux System Chapter 6. Analysis of a Suspect Program Appendix A: Tool Glossary