Text
Malware forensics: investigating and analyzing malicious code
Terdapat indeks.
Table of contents:
Chapter 1 - Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Chapter 2 - Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
Chapter 3 - Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 4 - Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Chapter 5 - Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Chapter 6 - Legal Considerations
Chapter 7 - File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System
Chapter 8 - File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
Chapter 9 - Analysis of a Suspect Program: Windows
Chapter 10 - Analysis of a Suspect Program: Linux
Index
No other version available