Vista normal Vista MARC Vista ISBD

Malware forensics : investigating and analyzing malicious code / James M. Aquilina, Eoghan Casey, Cameron H. Malin

Por: Aquilina, James J [autor] | Casey, Eoghan [autor] | Malin, Cameron H [autor].
Tipo de material: materialTypeLabelLibroEditor: Burlington, MA : Elsevier, 2008Descripción: xxxvi, 674 páginas.ISBN: 978-1-59749-268-3.Tema(s): Seguridad en computadores -- Control de acceso -- Criptografía | Delitos por computador | Protección de datos | Privacidad de los datos | Internet (Red de computadores) | Virus informáticos | Cifras y claves | ComputadoresClasificación CDD: 005.84 A656m
Contenidos:
• Chapter 1. Malware incident response: volatile data collection and axamination on a Live Windows System -- 1 • Chapter 2. Malware incident response: volatile data collection and examination on a live Linux System -- 93 • Chapter 3. Memory forensics : analyzing physical and process memory dumps for malware artifacts -- 121 • Chapter 4. Post-mortem forensics: discovering and extracting malware and associated artifacts from Windows System -- 193 • Chapter 5. Post-mortem forensics: discovering and extracting malware and associated artifacts from Linux System -- 231 • Chapter 6. Legal considerations -- 253 • Chapter 7. File identification and profiling: initial analysis of a suspect file on a Windows System -- 283 • Chapter 8. File identification and profiling: initial analysis of a suspect file on a Linux System -- 379 • Chapter 9. Analysis of a suspect program: Windows -- 489 • Chapter 10. Analysis of a suspect program : Linux -- 575
Tipo de ítem Biblioteca de origen Colección Signatura Copia número Estado Fecha de vencimiento Código de barras Reserva de ejemplares
Libro (Reserva) Libro (Reserva) Campus I
Reserva 005.84 A656m (Navegar estantería) Ej. 1 Disponible 090455
Libro (Col. General) Libro (Col. General) Campus I
Colección General 005.84 A656m (Navegar estantería) Ej. 2 No para préstamo 090456
Reservas Totales: 0

CAMPUS I

• Chapter 1. Malware incident response: volatile data collection and axamination on a Live Windows System -- 1
• Chapter 2. Malware incident response: volatile data collection and examination on a live Linux System -- 93
• Chapter 3. Memory forensics : analyzing physical and process memory dumps for malware artifacts -- 121
• Chapter 4. Post-mortem forensics: discovering and extracting malware and associated artifacts from Windows System -- 193
• Chapter 5. Post-mortem forensics: discovering and extracting malware and associated artifacts from Linux System -- 231
• Chapter 6. Legal considerations -- 253
• Chapter 7. File identification and profiling: initial analysis of a suspect file on a Windows System -- 283
• Chapter 8. File identification and profiling: initial analysis of a suspect file on a Linux System -- 379
• Chapter 9. Analysis of a suspect program: Windows -- 489
• Chapter 10. Analysis of a suspect program : Linux -- 575