The art of memory forensics: detecting malware and threats in Windows, Linux, and Mac memory
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital for...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
Wiley
2014
|
Schlagworte: | |
Online-Zugang: | UPA01 |
Zusammenfassung: | Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xxiii, 886 Seiten) |
ISBN: | 9781118825044 9781118824993 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043610973 | ||
003 | DE-604 | ||
005 | 20210521 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118825044 |9 978-1-118-82504-4 | ||
020 | |a 9781118824993 |9 978-1-118-82499-3 | ||
035 | |a (ZDB-30-PQE)EBC1740753 | ||
035 | |a (ZDB-89-EBL)EBL1740753 | ||
035 | |a (ZDB-38-EBR)ebr10895737 | ||
035 | |a (OCoLC)883892214 | ||
035 | |a (DE-599)BVBBV043610973 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
082 | 0 | |a 005.84 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ligh, Michael Hale |e Verfasser |4 aut | |
245 | 1 | 0 | |a The art of memory forensics |b detecting malware and threats in Windows, Linux, and Mac memory |
264 | 1 | |a Somerset |b Wiley |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online-Ressource (xxiii, 886 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Malware (Computer software) | |
650 | 0 | 7 | |a Speicher |g Informatik |0 (DE-588)4077653-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Detektion |0 (DE-588)4462534-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Speicher |g Informatik |0 (DE-588)4077653-0 |D s |
689 | 0 | 1 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 2 | |a Detektion |0 (DE-588)4462534-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Case, Andrew |e Verfasser |4 aut | |
700 | 1 | |a Levy, Jamie |e Verfasser |4 aut | |
700 | 1 | |a Walters, Aaron |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Hale Ligh, Michael |t Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory |z 978-1-118-82509-9 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029025032 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1740753 |l UPA01 |p ZDB-30-PQE |q UPA_Einzelkauf_Wiley |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176356094771200 |
---|---|
any_adam_object | |
author | Ligh, Michael Hale Case, Andrew Levy, Jamie Walters, Aaron |
author_facet | Ligh, Michael Hale Case, Andrew Levy, Jamie Walters, Aaron |
author_role | aut aut aut aut |
author_sort | Ligh, Michael Hale |
author_variant | m h l mh mhl a c ac j l jl a w aw |
building | Verbundindex |
bvnumber | BV043610973 |
classification_rvk | ST 276 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1740753 (ZDB-89-EBL)EBL1740753 (ZDB-38-EBR)ebr10895737 (OCoLC)883892214 (DE-599)BVBBV043610973 |
dewey-full | 005.84 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.84 |
dewey-search | 005.84 |
dewey-sort | 15.84 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03814nmm a2200577zc 4500</leader><controlfield tag="001">BV043610973</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210521 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118825044</subfield><subfield code="9">978-1-118-82504-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118824993</subfield><subfield code="9">978-1-118-82499-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1740753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1740753</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10895737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)883892214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043610973</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.84</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ligh, Michael Hale</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The art of memory forensics</subfield><subfield code="b">detecting malware and threats in Windows, Linux, and Mac memory</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 886 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Speicher</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4077653-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Detektion</subfield><subfield code="0">(DE-588)4462534-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Speicher</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4077653-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Detektion</subfield><subfield code="0">(DE-588)4462534-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Case, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Levy, Jamie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walters, Aaron</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Hale Ligh, Michael</subfield><subfield code="t">Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory</subfield><subfield code="z">978-1-118-82509-9</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029025032</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1740753</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UPA_Einzelkauf_Wiley</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043610973 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:53Z |
institution | BVB |
isbn | 9781118825044 9781118824993 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029025032 |
oclc_num | 883892214 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 1 Online-Ressource (xxiii, 886 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE UPA_Einzelkauf_Wiley |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Ligh, Michael Hale Verfasser aut The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory Somerset Wiley 2014 © 2014 1 Online-Ressource (xxiii, 886 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions Computer security Malware (Computer software) Speicher Informatik (DE-588)4077653-0 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Detektion (DE-588)4462534-0 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Speicher Informatik (DE-588)4077653-0 s Malware (DE-588)4687059-3 s Detektion (DE-588)4462534-0 s DE-604 Computerforensik (DE-588)4774034-6 s Case, Andrew Verfasser aut Levy, Jamie Verfasser aut Walters, Aaron Verfasser aut Erscheint auch als Druck-Ausgabe Hale Ligh, Michael Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory 978-1-118-82509-9 |
spellingShingle | Ligh, Michael Hale Case, Andrew Levy, Jamie Walters, Aaron The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory Computer security Malware (Computer software) Speicher Informatik (DE-588)4077653-0 gnd Computerforensik (DE-588)4774034-6 gnd Detektion (DE-588)4462534-0 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4077653-0 (DE-588)4774034-6 (DE-588)4462534-0 (DE-588)4687059-3 |
title | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_auth | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_exact_search | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_full | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_fullStr | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_full_unstemmed | The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory |
title_short | The art of memory forensics |
title_sort | the art of memory forensics detecting malware and threats in windows linux and mac memory |
title_sub | detecting malware and threats in Windows, Linux, and Mac memory |
topic | Computer security Malware (Computer software) Speicher Informatik (DE-588)4077653-0 gnd Computerforensik (DE-588)4774034-6 gnd Detektion (DE-588)4462534-0 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Computer security Malware (Computer software) Speicher Informatik Computerforensik Detektion Malware |
work_keys_str_mv | AT lighmichaelhale theartofmemoryforensicsdetectingmalwareandthreatsinwindowslinuxandmacmemory AT caseandrew theartofmemoryforensicsdetectingmalwareandthreatsinwindowslinuxandmacmemory AT levyjamie theartofmemoryforensicsdetectingmalwareandthreatsinwindowslinuxandmacmemory AT waltersaaron theartofmemoryforensicsdetectingmalwareandthreatsinwindowslinuxandmacmemory |