Malware forensics: investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems]
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2008
|
Schlagworte: | |
Beschreibung: | XXXVI, 674 S. Ill. 24 cm |
ISBN: | 9781597492683 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV036019730 | ||
003 | DE-604 | ||
005 | 20100222 | ||
007 | t | ||
008 | 100209s2008 xxua||| |||| 00||| eng d | ||
010 | |a 2008276581 | ||
020 | |a 9781597492683 |9 978-1-597-49268-3 | ||
035 | |a (OCoLC)916875714 | ||
035 | |a (DE-599)BVBBV036019730 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-634 | ||
050 | 0 | |a QA76.76.C68 | |
100 | 1 | |a Aquilina, James M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malware forensics |b investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] |c James M. Aquilina ; Eoghan Casey ; Cameron H. Malin |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2008 | |
300 | |a XXXVI, 674 S. |b Ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer viruses | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Casey, Eoghan |e Verfasser |0 (DE-588)140278141 |4 aut | |
700 | 1 | |a Malin, Cameron H. |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-018911883 |
Datensatz im Suchindex
_version_ | 1804141047475863552 |
---|---|
any_adam_object | |
author | Aquilina, James M. Casey, Eoghan Malin, Cameron H. |
author_GND | (DE-588)140278141 |
author_facet | Aquilina, James M. Casey, Eoghan Malin, Cameron H. |
author_role | aut aut aut |
author_sort | Aquilina, James M. |
author_variant | j m a jm jma e c ec c h m ch chm |
building | Verbundindex |
bvnumber | BV036019730 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C68 |
callnumber-search | QA76.76.C68 |
callnumber-sort | QA 276.76 C68 |
callnumber-subject | QA - Mathematics |
ctrlnum | (OCoLC)916875714 (DE-599)BVBBV036019730 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01659nam a2200409zc 4500</leader><controlfield tag="001">BV036019730</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100222 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100209s2008 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008276581</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492683</subfield><subfield code="9">978-1-597-49268-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)916875714</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036019730</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.C68</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensics</subfield><subfield code="b">investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems]</subfield><subfield code="c">James M. Aquilina ; Eoghan Casey ; Cameron H. Malin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXVI, 674 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)140278141</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018911883</subfield></datafield></record></collection> |
id | DE-604.BV036019730 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:09:40Z |
institution | BVB |
isbn | 9781597492683 |
language | English |
lccn | 2008276581 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018911883 |
oclc_num | 916875714 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | XXXVI, 674 S. Ill. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Aquilina, James M. Verfasser aut Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] James M. Aquilina ; Eoghan Casey ; Cameron H. Malin Burlington, MA Syngress Pub. c2008 XXXVI, 674 S. Ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Computer viruses Computer security Computer crimes Investigation Computervirus (DE-588)4214774-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computervirus (DE-588)4214774-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Casey, Eoghan Verfasser (DE-588)140278141 aut Malin, Cameron H. Verfasser aut |
spellingShingle | Aquilina, James M. Casey, Eoghan Malin, Cameron H. Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] Computer viruses Computer security Computer crimes Investigation Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4214774-8 (DE-588)4274324-2 |
title | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] |
title_auth | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] |
title_exact_search | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] |
title_full | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] James M. Aquilina ; Eoghan Casey ; Cameron H. Malin |
title_fullStr | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] James M. Aquilina ; Eoghan Casey ; Cameron H. Malin |
title_full_unstemmed | Malware forensics investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] James M. Aquilina ; Eoghan Casey ; Cameron H. Malin |
title_short | Malware forensics |
title_sort | malware forensics investigating and analyzing malicious code the only pratical hands on guide to malicious code investigation collect and examine volatile data from live windows and linux systems analyze physical and process memory dumps for malware artifacts on windows and linuy systems discover and extract artifacts from unix and windows systems |
title_sub | investigating and analyzing malicious code ; [the only pratical, hands-on guide to Malicious code investigation! ; collect and examine volatile data from Live Windows and Linux systems ; analyze physical and process memory dumps for malware artifacts on Windows and Linuy systems ; discover and extract artifacts from UNIX and Windows systems] |
topic | Computer viruses Computer security Computer crimes Investigation Computervirus (DE-588)4214774-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer viruses Computer security Computer crimes Investigation Computervirus Computersicherheit |
work_keys_str_mv | AT aquilinajamesm malwareforensicsinvestigatingandanalyzingmaliciouscodetheonlypraticalhandsonguidetomaliciouscodeinvestigationcollectandexaminevolatiledatafromlivewindowsandlinuxsystemsanalyzephysicalandprocessmemorydumpsformalwareartifactsonwindowsandlinuysystemsdiscover AT caseyeoghan malwareforensicsinvestigatingandanalyzingmaliciouscodetheonlypraticalhandsonguidetomaliciouscodeinvestigationcollectandexaminevolatiledatafromlivewindowsandlinuxsystemsanalyzephysicalandprocessmemorydumpsformalwareartifactsonwindowsandlinuysystemsdiscover AT malincameronh malwareforensicsinvestigatingandanalyzingmaliciouscodetheonlypraticalhandsonguidetomaliciouscodeinvestigationcollectandexaminevolatiledatafromlivewindowsandlinuxsystemsanalyzephysicalandprocessmemorydumpsformalwareartifactsonwindowsandlinuysystemsdiscover |