Terdapat bibliografi dan indeks. Table of Contents Chapter 1. Malware Incident Response Volatile Data Collection and Analysis Tools Non-Volatile Data Collection and Analysis Tools Selected Readings Jurisprudence/RFCS/Technical Specifications Chapter 2. Memory Forensics Chapter 3. Post-Mortem Forensics Chapter 4. Legal Considerations Chapter 5. File Identification and Profili…
Terdapat indeks. Table of Contents Chapter 1: Live Response: Collecting Volatile Data Chapter 2: Live Response: Analyzing Volatile Data Chapter 3: Windows Memory Analysis Chapter 4: Registry Analysis Chapter 5: File Analysis Chapter 6: Executable File Analysis Chapter 7: Rootkits and Rootkit Detection Chapter 8: Tying It All Together Chapter 9: Forensic Analysis on a Budget
Terdapat indeks. Table of contents: Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 4 - Post-Mortem Forensics: Discovering a…