Coverart for item
The Resource Malware forensics : investigating and analyzing malicious code, James M. Aquilina, Eoghan Casey, Cameron H. Malin

Malware forensics : investigating and analyzing malicious code, James M. Aquilina, Eoghan Casey, Cameron H. Malin

Label
Malware forensics : investigating and analyzing malicious code
Title
Malware forensics
Title remainder
investigating and analyzing malicious code
Statement of responsibility
James M. Aquilina, Eoghan Casey, Cameron H. Malin
Creator
Contributor
Subject
Genre
Language
eng
Summary
'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down
Cataloging source
N$T
http://library.link/vocab/creatorName
Aquilina, James M
Dewey number
  • 005.8/4
  • 363.25968
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
A68 2008eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Casey, Eoghan
  • Malin, Cameron H
http://library.link/vocab/subjectName
  • Computer security
  • Computer viruses
  • Computer crimes
  • COMPUTERS
  • Computer crimes
  • Computer security
  • Computer viruses
Label
Malware forensics : investigating and analyzing malicious code, James M. Aquilina, Eoghan Casey, Cameron H. Malin
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux
Control code
302358776
Dimensions
unknown
Extent
1 online resource (xxxvi, 676 pages)
File format
unknown
Form of item
online
Governing access note
Owing to Legal Deposit regulations this resource may only be accessed from within National Library of Scotland. For more information contact enquiries@nls.uk.
Isbn
9780080560199
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
  • cl0500000038
  • a6372c95-ad7f-4b4b-95b8-0ff3c0d3252b
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)302358776
Label
Malware forensics : investigating and analyzing malicious code, James M. Aquilina, Eoghan Casey, Cameron H. Malin
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux
Control code
302358776
Dimensions
unknown
Extent
1 online resource (xxxvi, 676 pages)
File format
unknown
Form of item
online
Governing access note
Owing to Legal Deposit regulations this resource may only be accessed from within National Library of Scotland. For more information contact enquiries@nls.uk.
Isbn
9780080560199
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
  • cl0500000038
  • a6372c95-ad7f-4b4b-95b8-0ff3c0d3252b
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)302358776

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...