Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
7 ½ X 9 ¼ in Introduction Chapter 1:Malware Incident Re sponse: Volatile Data Collection and Examination on a Live Windows Syste m Chapter 2:Malware Incident Response: Vol atile Data Collection and Examination on a Live Linux System Chapter 3:Memory Forensics: Analyzing Physical and Pr ocess Memory Dumps for Malware Artifacts Chapter 4: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Windows Systems Chapter 5: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Linux Systems Chapter 6: STRONG>Legal Considerations Chapter 7:File Identification and Profiling: Initial Analysis of a Suspect File on a W indows System Chapter 8:File Identificatio n and Profiling: Initial Analysis of a Suspect File On a Linux System Chapter 9:Analysis of a Suspect Program: Win dows Chapter 10:Analysis of a Suspect Prog
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
7 ½ X 9 ¼ in Introduction Chapter 1:Malware Incident Re sponse: Volatile Data Collection and Examination on a Live Windows Syste m Chapter 2:Malware Incident Response: Vol atile Data Collection and Examination on a Live Linux System Chapter 3:Memory Forensics: Analyzing Physical and Pr ocess Memory Dumps for Malware Artifacts Chapter 4: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Windows Systems Chapter 5: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Linux Systems Chapter 6: STRONG>Legal Considerations Chapter 7:File Identification and Profiling: Initial Analysis of a Suspect File on a W indows System Chapter 8:File Identificatio n and Profiling: Initial Analysis of a Suspect File On a Linux System Chapter 9:Analysis of a Suspect Program: Win dows Chapter 10:Analysis of a Suspect Prog