跳到内容
Malware forensics : investigating and analyzing malicious code 预览资料
关闭预览资料
正在查...

Malware forensics : investigating and analyzing malicious code

著者: James M Aquilina; Eoghan Casey; Cameron H Malin
出版商: Burlington, MA : Syngress Pub., ©2008.
版本/格式:   电子图书 : 文献 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Guidebooks
附加的形体格式: Print version:
Aquilina, James M.
Malware forensics.
Burlington, MA : Syngress Pub., ©2008
(OCoLC)192082631
材料类型: 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: James M Aquilina; Eoghan Casey; Cameron H Malin
ISBN: 9780080560199 0080560199
OCLC号码: 302358776
描述: 1 online resource (xxxvi, 676 pages) : illustrations
内容: Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System --
Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System --
Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts --
Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems --
Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems --
Ch. 6. Legal Considerations --
Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System --
Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System --
Ch. 9. Analysis of a Suspect Program: Windows --
Ch. 10. Analysis of a Suspect Program: Linux.
责任: James M. Aquilina, Eoghan Casey, Cameron H. Malin.

摘要:

'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


Primary Entity

<http://www.worldcat.org/oclc/302358776> # Malware forensics investigating and analyzing malicious code
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "302358776" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/792146012#Place/burlington_ma> ; # Burlington, MA
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=50'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}Img100.jpg'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=610'" ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=410'" ;
    schema:about <http://id.worldcat.org/fast/872684> ; # Computer viruses
    schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://dewey.info/class/005.84/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_viruses_identification> ; # Computer viruses--Identification
    schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_crimes_investigation> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/792146012#Topic/computers_security_viruses> ; # COMPUTERS--Security--Viruses
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/279440376> ; # Cameron H. Malin
    schema:contributor <http://viaf.org/viaf/6944400> ; # Eoghan Casey
    schema:copyrightYear "2008" ;
    schema:creator <http://viaf.org/viaf/9380066> ; # James M. Aquilina
    schema:datePublished "2008" ;
    schema:description "Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux."@en ;
    schema:description "'Malware Forensics' covers the emerging and evolving field of 'live forensics, ' where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/792146012> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Guidebooks"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/192082631> ;
    schema:name "Malware forensics investigating and analyzing malicious code"@en ;
    schema:productID "302358776" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/302358776#PublicationEvent/burlington_ma_syngress_pub_2008> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/792146012#Agent/syngress_pub> ; # Syngress Pub.
    schema:url <http://www.myilibrary.com?id=176295&ref=toc> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=50" ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492683> ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}Img100.jpg" ;
    schema:url <http://www.myilibrary.com?id=176295> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=239212> ;
    schema:url <http://proquest.safaribooksonline.com/9781597492683> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=610" ;
    schema:url <http://proquestcombo.safaribooksonline.com/9781597492683> ;
    schema:url <http://site.ebrary.com/id/10254619> ;
    schema:url "http://www.contentreserve.com/TitleInfo.asp?ID={A6372C95-AD7F-4B4B-95B8-0FF3C0D3252B}&Format=410" ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781597492683> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=32218> ;
    schema:workExample <http://worldcat.org/isbn/9780080560199> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/302358776> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/792146012#Agent/syngress_pub> # Syngress Pub.
    a bgn:Agent ;
    schema:name "Syngress Pub." ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Place/burlington_ma> # Burlington, MA
    a schema:Place ;
    schema:name "Burlington, MA" ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Topic/computer_crimes_investigation> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/792146012#Topic/computers_security_viruses> # COMPUTERS--Security--Viruses
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Viruses"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872684> # Computer viruses
    a schema:Intangible ;
    schema:name "Computer viruses"@en ;
    .

<http://viaf.org/viaf/279440376> # Cameron H. Malin
    a schema:Person ;
    schema:familyName "Malin" ;
    schema:givenName "Cameron H." ;
    schema:name "Cameron H. Malin" ;
    .

<http://viaf.org/viaf/6944400> # Eoghan Casey
    a schema:Person ;
    schema:familyName "Casey" ;
    schema:givenName "Eoghan" ;
    schema:name "Eoghan Casey" ;
    .

<http://viaf.org/viaf/9380066> # James M. Aquilina
    a schema:Person ;
    schema:familyName "Aquilina" ;
    schema:givenName "James M." ;
    schema:name "James M. Aquilina" ;
    .

<http://worldcat.org/isbn/9780080560199>
    a schema:ProductModel ;
    schema:isbn "0080560199" ;
    schema:isbn "9780080560199" ;
    .

<http://www.worldcat.org/oclc/192082631>
    a schema:CreativeWork ;
    rdfs:label "Malware forensics." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/302358776> ; # Malware forensics investigating and analyzing malicious code
    .


Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.