000 | 03046nam a2200421 a 4500 | ||
---|---|---|---|
003 | OCoLC | ||
005 | 20220412100238.0 | ||
008 | 090825s2014 mau b 001 0 eng d | ||
020 |
_a9781597494700 _qpbk. |
||
020 |
_a1597494704 _qpbk. |
||
035 | _a(OCoLC)895060938 | ||
040 |
_aLCC _beng _cGSU _dGSU _erda |
||
050 | 4 |
_aQA76.9.A25 _bMAL |
|
050 | 1 | 4 |
_aQA76.76.C68 _bM32 2014 |
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 |
_aMalin, Cameron H. _0http://id.loc.gov/authorities/names/nb2008018757. |
|
245 | 1 | 0 |
_aMalware forensic field guide for Linux systems : _bdigital forensics field guides / _cCameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor. |
264 | 1 |
_aWaltham, Mass. : _bSyngress / Elsevier, _c2014. |
|
300 |
_axxxix, 574 pages ; _c23 cm. _billustrations ( same color) |
||
336 |
_atext _btxt _2rdacontent. |
||
337 |
_aunmediated _bn _2rdamedia. |
||
338 |
_avolume _bnc _2rdacarrier. |
||
500 | _aincludes index | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aMalware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen. | |
520 | _aMalware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code. | ||
630 | 0 | 0 |
_aLinux _vHandbooks, manuals, etc. |
650 | 0 |
_aComputer viruses. _0http://id.loc.gov/authorities/subjects/sh88004897. |
|
650 | 0 |
_aMalware (Computer software) _vHandbooks, manuals, etc. |
|
650 | 0 |
_aOperating systems (Computers) _0http://id.loc.gov/authorities/subjects/sh85094982. |
|
650 | 0 |
_aComputer security. _0http://id.loc.gov/authorities/subjects/sh90001862. |
|
650 | 0 |
_aForensic sciences. _0http://id.loc.gov/authorities/subjects/sh90001487. |
|
700 | 1 |
_aCasey, Eoghan. _0http://id.loc.gov/authorities/names/no00092111. |
|
700 | 1 |
_aAquilina, James M. _0http://id.loc.gov/authorities/names/nb2008018756. |
|
700 | 1 |
_aRose, Curtis W. _0http://id.loc.gov/authorities/names/no2005104193. |
|
942 |
_2lcc _cBK _n0 |
||
999 |
_c553 _d553 |