Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems
  • Paperback: 134 pages
  • Publisher: WOW! eBook; 1st edition (March 22, 2013)
  • Language: English
  • ISBN-10: 0124095070
  • ISBN-13: 978-0124095076
eBook Description:

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems

  • Presented in a succinct outline format with cross-references to included supplemental components and appendices
  • Covers volatile data collection methodology as well as non-volatile data collection from a live Linux system
  • Addresses malware artifact discovery and extraction from a live Linux system

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems is a “first look” at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The WOW! eBook Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a “toolkit” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems

  • Presented in a succinct outline format with cross-references to included supplemental components and appendices
  • Covers volatile data collection methodology as well as non-volatile data collection from a live Linux system
  • Addresses malware artifact discovery and extraction from a live Linux system

Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems is a “first look” at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The WOW! eBook Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a “toolkit” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

Evaluate & Comment:

Overall rating
  • 5 Starts
    0
  • 4 Starts
    0
  • 3 Starts
    0
  • 2 Starts
    0
  • 1 Starts
    0

Top