eBooks-it.org Logo
eBooks-IT.org Inner Image

Linux Malware Incident Response

A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Cameron H. Malin
Edition:1
ISBN-10:0124095070
ISBN-13:9780124095076
Pages:134
Published:Mar 08 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:14.97 MB

Book Description:

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Download Link:

Related Books:

Computer Incident Response and Forensics Team Management

Conducting a Successful Incident Response
Computer Incident Response and Forensics Team Management Image
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response component...

Computer Incident Response and Product Security

Computer Incident Response and Product Security Image
Computer Incident Response and Product Security The practical guide to building and running incident response and product security teams Damir Rajnovic Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed and effectiveness with which a company can respond to incidents has a direct impact on how devastating an incident is on the company's operations and finances. However, few have an experienced, mature incident response (IR) team. Many companies have no IR teams at all; others need help with improving current practices. In this book, leading Cisco incident response expert Damir Rajnovic presents start-to-finish guidance for creating and operating effective IR team...

Hacker's Challenge

Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge Image
"Hacker's Challenge" will consist of 20-25 hacking scenarios followed by the solution for each. The challenges/chapters are organized by increasing levels of complexity, and covers many hot topics, including Web content, VPNs, Denial of Service, wireless issues, e-commerce, email attacks and more. It includes input from top names in the industry - in addition to Mike Schiffman, consultants from the top security firms, such as Guardent, Foundstone, @Stake, SecurityFocus.com, In-Q-Tel, Arbor Networks, LoudCloud and more contribute their expertise. It is intended for a broad audience - "Hacker's Challenge" is for anyone who wants to solve the latest hacking challenges. It is a great companion to "Hacking Exposed" - an entir...



2007 - 2021 © eBooks-IT.org