eBooks-it.org Logo
eBooks-IT.org Inner Image

Malware Forensics

Investigating and Analyzing Malicious Code

Malware Forensics Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:Eoghan Casey
Edition:1
ISBN-10:159749268X
ISBN-13:9781597492683
Pages:592
Published:Jun 30 2008
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:25.03 MB

Book Description:

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics. Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. * Winner of Best Book Bejtlich read in 2008!* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.* First book to detail how to perform "live forensic" techniques on malicous code.* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Download Link:

Related Books:

Malware Forensics Field Guide for Windows Systems

Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems Image
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a"tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.*A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world *Authors are world-renowned leaders in investigating and analyzing malicious code...

Malware Forensics

Field Guide for Linux Systems
Malware Forensics Image
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.A compendium of on-the-job tasks and checklistsSpecific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned lea...

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux and Mac Memory
The Art of Memory Forensics Image
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on ...



2007 - 2021 © eBooks-IT.org