Malware forensics field guide for Windows systems digital forensics field guides

Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. This title presents a tool with checklists for specific tasks, case studies of difficult situations,...

Full description

Saved in:
Bibliographic Details
Main Author: Malin, Cameron H.
Other Authors: Casey, Eoghan, Aquilina, James M.
Format: Book
Language:English
Published: Waltham, MA Syngress c2012.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 49370
003 MY-KLNDU
005 20241219005709.0
008 130913e2012 xxua bi 001 0 eng d
010 |a 2012-019134 
020 |a 9781597494724 (pbk. : alk. paper) 
039 9 |a 201406061203  |b zul  |c 201402261241  |d johari  |y 201309131511  |z izyan 
040 |a UPNM 
090 |a QA76.76.C68  |b M35 2012 
100 1 |a Malin, Cameron H. 
245 1 0 |a Malware forensics field guide for Windows systems  |b digital forensics field guides  |c Cameron H. Malin, Eoghan Casey, James M. Aquilina; Curtis W. Rose, technical editor. 
260 |a Waltham, MA  |b Syngress  |c c2012. 
300 |a xxxviii, 518 p.  |b ill.  |c 23 cm. 
504 |a Includes bibliographical references and index. 
520 |a Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. This title presents a tool with checklists for specific tasks, case studies of difficult situations, and analyst tips. 
592 |a 9453  |b 15/11/2013  |c RM 185.36  |h RIMA 
650 0 |a Malware (Computer software) 
650 0 |a Computer viruses. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x investigation. 
700 1 |a Casey, Eoghan. 
700 1 |a Aquilina, James M. 
999 |a vtls000050094  |c 49370  |d 49370