Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides , a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists. A condensed hand-held guide complete with on-the-job tasks and checklists Specific for Windows-based systems, the largest running OS in the world Authors are world-renowned leaders in investigating and analyzing malicious code
Malware (Computer software) --- Computer viruses. --- Computer security. --- Computer crimes --- Investigation. --- Microsoft Windows (Computer file) --- Computer viruses --- Computer security --- Forensic sciences --- Linux --- Information Technology --- General and Others --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software viruses --- Viruses, Computer --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Protection --- Security measures --- Slackware Linux --- SUSE Linux --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10 --- Investigation
Choose an application
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised
Computer security. --- Computer viruses --- Computer crimes --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Software viruses --- Viruses, Computer --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information Technology --- General and Others
Choose an application
Choose an application
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a la.
Choose an application
'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.
Choose an application
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
Choose an application
Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code.
Listing 1 - 7 of 7 |
Sort by
|