The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
As a followup to the best-seller Malware Analyst's Cookbook, experts in IT security bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
[2014]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 53244 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014412.0 | ||
| 008 | 221104s2014 inua 001 0 eng d | ||
| 020 | |a 9781118825099 | ||
| 020 | |z 9781118825044 (ebk) | ||
| 020 | |z 9781118824993 (ebk) | ||
| 039 | 9 | |a 202211041229 |b VLOAD |c 202002111430 |d azraai |y 201904030945 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b L54 2014 | ||
| 100 | 1 | |a Ligh, Michael Hale |e author | |
| 245 | 1 | 4 | |a The art of memory forensics |b detecting malware and threats in Windows, Linux, and Mac memory |c Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters |
| 246 | 3 | |a Detecting malware and threats in Windows, Linux, and Mac memory | |
| 264 | 1 | |a Indianapolis, IN |b Wiley |c [2014] | |
| 264 | 4 | |c ©2014 | |
| 300 | |a xxiii, 886 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 520 | |a As a followup to the best-seller Malware Analyst's Cookbook, experts in IT security bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, teaches the art of analysing computer memory (RAM) to solve digital crimes. | ||
| 592 | |a 00101/HL/2019 (750) |b 19/9/19 |c RM294.12 |h Han Lin Books | ||
| 650 | 0 | |a Malware (Computer software) | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer crimes | |
| 700 | 1 | |a Case, Andrew |c (Digital forensics researcher) |e author | |
| 700 | 1 | |a Levy, Jamie |e author | |
| 700 | 1 | |a Walters, Aaron |e author | |
| 999 | |a vtls000063162 |c 53244 |d 53244 | ||


