Malware forensics : investigating and analyzing malicious code / James M. Aquilina, Eoghan Casey, Cameron H. Malin
Por: Aquilina, James J [autor]
| Casey, Eoghan [autor]
| Malin, Cameron H [autor]
.
Tipo de material: 
Tipo de ítem | Biblioteca de origen | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras | Reserva de ejemplares |
---|---|---|---|---|---|---|---|---|
![]() |
Campus I | Reserva | 005.84 A656m (Navegar estantería) | Ej. 1 | Disponible | 090455 | ||
![]() |
Campus I | Colección General | 005.84 A656m (Navegar estantería) | Ej. 2 | No para préstamo | 090456 |
CAMPUS I
• Chapter 1. Malware incident response: volatile data collection and axamination on a Live Windows System -- 1
• Chapter 2. Malware incident response: volatile data collection and examination on a live Linux System -- 93
• Chapter 3. Memory forensics : analyzing physical and process memory dumps for malware artifacts -- 121
• Chapter 4. Post-mortem forensics: discovering and extracting malware and associated artifacts from Windows System -- 193
• Chapter 5. Post-mortem forensics: discovering and extracting malware and associated artifacts from Linux System -- 231
• Chapter 6. Legal considerations -- 253
• Chapter 7. File identification and profiling: initial analysis of a suspect file on a Windows System -- 283
• Chapter 8. File identification and profiling: initial analysis of a suspect file on a Linux System -- 379
• Chapter 9. Analysis of a suspect program: Windows -- 489
• Chapter 10. Analysis of a suspect program : Linux -- 575