The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
As a followup to the best-seller Malware Analyst's Cookbook, experts in IT security bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The...
Saved in:
| Main Authors: | Ligh, Michael Hale (Author), Case, Andrew (Digital forensics researcher) (Author), Levy, Jamie (Author), Walters, Aaron (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
[2014]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011)
by: Ligh, Michael Hale, et al.
Published: (2011)
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Digital forensics and incident response incident response tools and techniques for effective cyber threat response
by: Johansen, Gerard
Published: (2022)
by: Johansen, Gerard
Published: (2022)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Cybersecurity wellness index evaluation framework for critical organisations
by: Husin Jazri
Published: (2019)
by: Husin Jazri
Published: (2019)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Digital forensics
Published: (2018)
Published: (2018)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Cybersecurity for beginners
by: Meeuwisse, Raef
Published: (2017)
by: Meeuwisse, Raef
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Similar Items
-
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011) -
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012) -
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018) -
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010) -
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)


