Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Malware Forensics: Investigating and Analyzing Malicious Code
Paperback

Malware Forensics: Investigating and Analyzing Malicious Code

$94.95
Sign in or become a Readings Member to add this title to your wishlist.

7 ½ X 9 ¼ in Introduction Chapter 1:Malware Incident Re sponse: Volatile Data Collection and Examination on a Live Windows Syste m Chapter 2:Malware Incident Response: Vol atile Data Collection and Examination on a Live Linux System Chapter 3:Memory Forensics: Analyzing Physical and Pr ocess Memory Dumps for Malware Artifacts Chapter 4: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Windows Systems Chapter 5: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Linux Systems Chapter 6: STRONG>Legal Considerations Chapter 7:File Identification and Profiling: Initial Analysis of a Suspect File on a W indows System Chapter 8:File Identificatio n and Profiling: Initial Analysis of a Suspect File On a Linux System Chapter 9:Analysis of a Suspect Program: Win dows Chapter 10:Analysis of a Suspect Prog

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Syngress Media,U.S.
Country
United States
Date
8 August 2008
Pages
592
ISBN
9781597492683

7 ½ X 9 ¼ in Introduction Chapter 1:Malware Incident Re sponse: Volatile Data Collection and Examination on a Live Windows Syste m Chapter 2:Malware Incident Response: Vol atile Data Collection and Examination on a Live Linux System Chapter 3:Memory Forensics: Analyzing Physical and Pr ocess Memory Dumps for Malware Artifacts Chapter 4: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Windows Systems Chapter 5: Post-Mortem Forensics: Discovering and Extracting Malware and A ssociated Artifacts from Linux Systems Chapter 6: STRONG>Legal Considerations Chapter 7:File Identification and Profiling: Initial Analysis of a Suspect File on a W indows System Chapter 8:File Identificatio n and Profiling: Initial Analysis of a Suspect File On a Linux System Chapter 9:Analysis of a Suspect Program: Win dows Chapter 10:Analysis of a Suspect Prog

Read More
Format
Paperback
Publisher
Syngress Media,U.S.
Country
United States
Date
8 August 2008
Pages
592
ISBN
9781597492683