Malware forensics field guide for Windows systems digital forensics field guides
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. This title presents a tool with checklists for specific tasks, case studies of difficult situations,...
Saved in:
| Main Author: | Malin, Cameron H. |
|---|---|
| Other Authors: | Casey, Eoghan, Aquilina, James M. |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
c2012.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011)
by: Ligh, Michael Hale, et al.
Published: (2011)
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2012)
by: Sammons, John
Published: (2012)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Digital Forensics, Investigation, and Response /
by: Easttom, Chuck
Published: (2022)
by: Easttom, Chuck
Published: (2022)
Digital forensics
Published: (2018)
Published: (2018)
A framework of determining the malware factor of suspicious files based on its behaviours
by: Nur Shamimi Che Anuar
Published: (2015)
by: Nur Shamimi Che Anuar
Published: (2015)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri
Published: (2012)
by: Davidoff, Sherri
Published: (2012)
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, Michael A.
Published: (2010)
by: Davis, Michael A.
Published: (2010)
A Practical Guide to Digital Forensics Investigations /
by: Hayes, Darren Richard
Published: (2021)
by: Hayes, Darren Richard
Published: (2021)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Mobile network forensics emerging research and opportunities
by: Sharevski, Filipo 1985
Published: (2019)
by: Sharevski, Filipo 1985
Published: (2019)
Digital Forensics and Cyber Crime Investigation : Recent Advances and Future Directions /
Published: (2025)
Published: (2025)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Similar Items
-
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014) -
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011) -
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014) -
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016) -
Guide to computer forensics and investigations
Published: (2008)


