Art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters.
By: Ligh, Michael Hale [author.].
Contributor(s): Case, Andrew (Digital forensics researcher) [author.] | Levy, Jamie [author.] | Walters, Aaron [author.].
Material type: TextPublisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014General Notes: Includes index; Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.Description: 1 online resource (886 pages) : illustrations.Content type: text Media type: computer Carrier type: online resourceISBN: 9781118825044; 9781118824993.Subject(s): Computer security | Computer networks -- Security measures | Malware (Computer software) | Computer crimesGenre/Form: Electronic books. DDC classification: 363.25 | 363.25/968 | 363.25968 Online resources: Access full-text materials at no charge:Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
E-book | Davenport Library e-book | E-book | 363.25 363.25/968 363.25968 (Browse shelf(Opens below)) | Not For Loan | mq609226 |
Browsing Davenport Library shelves, Shelving location: e-book , Collection: E-book Close shelf browser (Hides shelf browser)
Includes index.
Available through the EBSCO e-book Collection, which can be found on the Davenport University Library database page.
I. An introduction to memory forensics -- II. Windows memory forensics -- III. Linux memory forensics -- IV. Mac memory forensics.
"Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly"--Provided by publisher.
Print version record.
There are no comments on this title.