doorgaan naar inhoud
Malware forensics : investigating and analyzing malicious code Voorbeeldweergave van dit item
SluitenVoorbeeldweergave van dit item
Bezig met controle...

Malware forensics : investigating and analyzing malicious code

Auteur: James M Aquilina; Eoghan Casey; Cameron H Malin
Uitgever: Burlington, MA : Syngress Pub., ©2008.
Editie/Formaat:   eBoek : Document : EngelsAlle edities en materiaalsoorten bekijken.
Database:WorldCat
Samenvatting:
'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.
Beoordeling:

(nog niet beoordeeld) 0 met beoordelingen - U bent de eerste

Onderwerpen
Meer in deze trant

 

Zoeken naar een in de bibliotheek beschikbaar exemplaar

&AllPage.SpinnerRetrieving; Bibliotheken met dit item worden gezocht…

Details

Genre/Vorm: Electronic books
Guidebooks
Aanvullende fysieke materiaalsoort: Print version:
Aquilina, James M.
Malware forensics.
Burlington, MA : Syngress Pub., ©2008
(OCoLC)192082631
Genre: Document, Internetbron
Soort document: Internetbron, Computerbestand
Alle auteurs / medewerkers: James M Aquilina; Eoghan Casey; Cameron H Malin
ISBN: 9780080560199 0080560199
OCLC-nummer: 302358776
Beschrijving: 1 online resource (xxxvi, 676 pages) : illustrations
Inhoud: Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System --
Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System --
Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts --
Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems --
Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems --
Ch. 6. Legal Considerations --
Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System --
Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System --
Ch. 9. Analysis of a Suspect Program: Windows --
Ch. 10. Analysis of a Suspect Program: Linux.
Verantwoordelijkheid: James M. Aquilina, Eoghan Casey, Cameron H. Malin.

Fragment:

Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live  Meer lezen...

Beoordelingen

Beoordelingen door gebruikers
Beoordelingen van GoodReads worden opgehaald...
Bezig met opvragen DOGObooks-reviews...

Tags

U bent de eerste.
Bevestig deze aanvraag

Misschien heeft u dit item reeds aangevraagd. Selecteer a.u.b. Ok als u toch wilt doorgaan met deze aanvraag.

Gekoppelde data


Primary Entity

<http://www.worldcat.org/oclc/302358776> # Malware forensics : investigating and analyzing malicious code
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "302358776" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/792146012#Place/burlington_ma> ; # Burlington, MA
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}Img100.jpg'" ;
    schema:about <http://id.worldcat.org/fast/872684> ; # Computer viruses
    schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://dewey.info/class/005.84/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_viruses_identification> ; # Computer viruses--Identification
    schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_crimes_investigation> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computers_security_viruses> ; # COMPUTERS--Security--Viruses
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/279440376> ; # Cameron H. Malin
    schema:contributor <http://viaf.org/viaf/69145911210427062302> ; # Eoghan Casey
    schema:copyrightYear "2008" ;
    schema:creator <http://viaf.org/viaf/9380066> ; # James M. Aquilina
    schema:datePublished "2008" ;
    schema:description "Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux."@en ;
    schema:description "'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/792146012> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Guidebooks"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/192082631> ;
    schema:name "Malware forensics : investigating and analyzing malicious code"@en ;
    schema:productID "302358776" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/302358776#PublicationEvent/burlington_ma_syngress_pub_2008> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/792146012#Agent/syngress_pub> ; # Syngress Pub.
    schema:url <https://samples.overdrive.com/?crid=A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B&.epub-sample.overdrive.com> ;
    schema:url <http://www.myilibrary.com?id=176295&ref=toc> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492683> ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}Img100.jpg" ;
    schema:url <http://www.myilibrary.com?id=176295> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239212> ;
    schema:url <http://proquest.safaribooksonline.com/9781597492683> ;
    schema:url <http://proquestcombo.safaribooksonline.com/9781597492683> ;
    schema:url <http://site.ebrary.com/id/10254619> ;
    schema:url <https://www.overdrive.com/search?q=A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781597492683> ;
    schema:url <http://excerpts.cdn.overdrive.com/FormatType-410/1706-1/A63/72C/95/MalwareForensics9780080560199.epub> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=32218> ;
    schema:workExample <http://worldcat.org/isbn/9780080560199> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/302358776> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/792146012#Agent/syngress_pub> # Syngress Pub.
    a bgn:Agent ;
    schema:name "Syngress Pub." ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Place/burlington_ma> # Burlington, MA
    a schema:Place ;
    schema:name "Burlington, MA" ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_crimes_investigation> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Topic/computers_security_viruses> # COMPUTERS--Security--Viruses
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Viruses"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872684> # Computer viruses
    a schema:Intangible ;
    schema:name "Computer viruses"@en ;
    .

<http://viaf.org/viaf/279440376> # Cameron H. Malin
    a schema:Person ;
    schema:familyName "Malin" ;
    schema:givenName "Cameron H." ;
    schema:name "Cameron H. Malin" ;
    .

<http://viaf.org/viaf/69145911210427062302> # Eoghan Casey
    a schema:Person ;
    schema:familyName "Casey" ;
    schema:givenName "Eoghan" ;
    schema:name "Eoghan Casey" ;
    .

<http://viaf.org/viaf/9380066> # James M. Aquilina
    a schema:Person ;
    schema:familyName "Aquilina" ;
    schema:givenName "James M." ;
    schema:name "James M. Aquilina" ;
    .

<http://worldcat.org/isbn/9780080560199>
    a schema:ProductModel ;
    schema:isbn "0080560199" ;
    schema:isbn "9780080560199" ;
    .

<http://www.worldcat.org/oclc/192082631>
    a schema:CreativeWork ;
    rdfs:label "Malware forensics." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/302358776> ; # Malware forensics : investigating and analyzing malicious code
    .


Content-negotiable representations

Venster sluiten

Meld u aan bij WorldCat 

Heeft u geen account? U kunt eenvoudig een nieuwe gratis account aanmaken.