跳到内容
Malware forensics : investigating and analyzing malicious code 预览资料
关闭预览资料
正在查...

Malware forensics : investigating and analyzing malicious code

著者: James M Aquilina; Eoghan Casey; Cameron H Malin
出版商: Burlington, MA : Syngress Pub., ©2008.
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Guidebooks
附加的形体格式: Print version:
Aquilina, James M.
Malware forensics.
Burlington, MA : Syngress Pub., c2008
(OCoLC)192082631
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: James M Aquilina; Eoghan Casey; Cameron H Malin
ISBN: 9780080560199 0080560199
OCLC号码: 302358776
描述: 1 online resource (xxxvi, 676 p.) : ill.
内容: Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System --
Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System --
Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts --
Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems --
Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems --
Ch. 6. Legal Considerations --
Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System --
Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System --
Ch. 9. Analysis of a Suspect Program: Windows --
Ch. 10. Analysis of a Suspect Program: Linux.
责任: James M. Aquilina, Eoghan Casey, Cameron H. Malin.

摘要:

'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/302358776>
library:oclcnum"302358776"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/302358776>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2008"
schema:creator
schema:datePublished"2008"
schema:description"Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux."@en
schema:description"'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/792146012>
schema:genre"Electronic books."@en
schema:genre"Guidebooks"@en
schema:genre"Guidebooks."@en
schema:inLanguage"en"
schema:name"Malware forensics investigating and analyzing malicious code"@en
schema:numberOfPages"676"
schema:publisher
schema:url
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=50>
schema:url<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492683>
schema:url<http://www.myilibrary.com?id=176295>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239212>
schema:url<http://proquest.safaribooksonline.com/9781597492683>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=610>
schema:url<http://site.ebrary.com/id/10254619>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=410>
schema:url<http://proquest.tech.safaribooksonline.de/9781597492683>
schema:url<http://www.books24x7.com/marc.asp?bookid=32218>
schema:workExample

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.