Malware forensics field guide for Windows dystems: digital forensics field guides
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
c2012
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world *Authors are world-renowned leaders in investigating and analyzing malicious code Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597494724 1597494720 9781597494731 1597494739 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305219 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597494724 |c electronic bk. |9 978-1-59749-472-4 | ||
020 | |a 1597494720 |c electronic bk. |9 1-59749-472-0 | ||
020 | |a 9781597494731 |9 978-1-59749-473-1 | ||
020 | |a 1597494739 |9 1-59749-473-9 | ||
035 | |a (ZDB-33-EBS)ocn794596886 | ||
035 | |a (OCoLC)794596886 | ||
035 | |a (DE-599)BVBBV042305219 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8/4 |2 23 | |
100 | 1 | |a Malin, Cameron H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malware forensics field guide for Windows dystems |b digital forensics field guides |c Cameron H. Malin, Eoghan Casey, James M. Aquilina |
264 | 1 | |a Waltham, MA |b Syngress |c c2012 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world *Authors are world-renowned leaders in investigating and analyzing malicious code | ||
500 | |a Includes bibliographical references and index | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 7 | |a Microsoft Windows (Computer file) |2 blmlsh | |
650 | 7 | |a Malware (Computer software) |2 local | |
650 | 7 | |a Computer crimes / Investigation |2 local | |
650 | 7 | |a Computer viruses |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Microsoft Windows (Computer file) |2 fast | |
650 | 7 | |a Computer crimes / Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Malware (Computer software) |2 fast | |
650 | 4 | |a Microsoft Windows (Computer file) | |
650 | 4 | |a Malware (Computer software) | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes |x Investigation | |
700 | 1 | |a Casey, Eoghan |e Sonstige |4 oth | |
700 | 1 | |a Aquilina, James M. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597494724 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742211 |
Datensatz im Suchindex
_version_ | 1804152888068407296 |
---|---|
any_adam_object | |
author | Malin, Cameron H. |
author_facet | Malin, Cameron H. |
author_role | aut |
author_sort | Malin, Cameron H. |
author_variant | c h m ch chm |
building | Verbundindex |
bvnumber | BV042305219 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn794596886 (OCoLC)794596886 (DE-599)BVBBV042305219 |
dewey-full | 005.8/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/4 |
dewey-search | 005.8/4 |
dewey-sort | 15.8 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02858nmm a2200613zc 4500</leader><controlfield tag="001">BV042305219</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494724</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-472-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494720</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-472-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494731</subfield><subfield code="9">978-1-59749-473-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494739</subfield><subfield code="9">1-59749-473-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn794596886</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794596886</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305219</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensics field guide for Windows dystems</subfield><subfield code="b">digital forensics field guides</subfield><subfield code="c">Cameron H. Malin, Eoghan Casey, James M. Aquilina</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world *Authors are world-renowned leaders in investigating and analyzing malicious code</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597494724</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742211</subfield></datafield></record></collection> |
id | DE-604.BV042305219 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597494724 1597494720 9781597494731 1597494739 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742211 |
oclc_num | 794596886 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Malin, Cameron H. Verfasser aut Malware forensics field guide for Windows dystems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina Waltham, MA Syngress c2012 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world *Authors are world-renowned leaders in investigating and analyzing malicious code Includes bibliographical references and index Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Malware (Computer software) local Computer crimes / Investigation local Computer viruses local Computer security local Microsoft Windows (Computer file) fast Computer crimes / Investigation fast Computer security fast Computer viruses fast Malware (Computer software) fast Malware (Computer software) Computer viruses Computer security Computer crimes Investigation Casey, Eoghan Sonstige oth Aquilina, James M. Sonstige oth http://www.sciencedirect.com/science/book/9781597494724 Verlag Volltext |
spellingShingle | Malin, Cameron H. Malware forensics field guide for Windows dystems digital forensics field guides Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Malware (Computer software) local Computer crimes / Investigation local Computer viruses local Computer security local Microsoft Windows (Computer file) fast Computer crimes / Investigation fast Computer security fast Computer viruses fast Malware (Computer software) fast Malware (Computer software) Computer viruses Computer security Computer crimes Investigation |
title | Malware forensics field guide for Windows dystems digital forensics field guides |
title_auth | Malware forensics field guide for Windows dystems digital forensics field guides |
title_exact_search | Malware forensics field guide for Windows dystems digital forensics field guides |
title_full | Malware forensics field guide for Windows dystems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_fullStr | Malware forensics field guide for Windows dystems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_full_unstemmed | Malware forensics field guide for Windows dystems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_short | Malware forensics field guide for Windows dystems |
title_sort | malware forensics field guide for windows dystems digital forensics field guides |
title_sub | digital forensics field guides |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) blmlsh Malware (Computer software) local Computer crimes / Investigation local Computer viruses local Computer security local Microsoft Windows (Computer file) fast Computer crimes / Investigation fast Computer security fast Computer viruses fast Malware (Computer software) fast Malware (Computer software) Computer viruses Computer security Computer crimes Investigation |
topic_facet | Microsoft Windows (Computer file) Malware (Computer software) Computer crimes / Investigation Computer viruses Computer security Computer crimes Investigation |
url | http://www.sciencedirect.com/science/book/9781597494724 |
work_keys_str_mv | AT malincameronh malwareforensicsfieldguideforwindowsdystemsdigitalforensicsfieldguides AT caseyeoghan malwareforensicsfieldguideforwindowsdystemsdigitalforensicsfieldguides AT aquilinajamesm malwareforensicsfieldguideforwindowsdystemsdigitalforensicsfieldguides |