Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

by Cameron H. Malin, Eoghan Casey
     
 

View All Available Formats & Editions

ISBN-10: 1597494704

ISBN-13: 9781597494700

Pub. Date: 12/29/2013

Publisher: Elsevier Science

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct

Overview

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

  • A compendium of on-the-job tasks and checklists
  • Specific for Linux-based systems in which new malware is developed every day
  • Authors are world-renowned leaders in investigating and analyzing malicious code

Product Details

ISBN-13:
9781597494700
Publisher:
Elsevier Science
Publication date:
12/29/2013
Pages:
574
Sales rank:
768,216
Product dimensions:
6.00(w) x 8.90(h) x 1.00(d)

Table of Contents

Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System Chapter 2. Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems Chapter 4. Legal Considerations Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Linux System Chapter 6. Analysis of a Suspect Program Appendix A: Tool Glossary

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >