The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

3.5
ISBN-13: 9781118825099
ISBN-10: 1118825098
Edition: 1
Author: Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Publication date: 2014
Publisher: Wiley
Format: Paperback 912 pages
FREE shipping on ALL orders

Book details

ISBN-13: 9781118825099
ISBN-10: 1118825098
Edition: 1
Author: Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Publication date: 2014
Publisher: Wiley
Format: Paperback 912 pages

Summary

Acknowledged authors Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters wrote The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory comprising 912 pages back in 2014. Textbook and eTextbook are published under ISBN 1118825098 and 9781118825099. Since then The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory textbook received total rating of 3.5 stars and was available to sell back to BooksRun online for the top buyback price of $ 25.59 or rent at the marketplace.

Description

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics―now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:

  • How volatile memory analysis improves digital investigations
  • Proper investigative steps for detecting stealth malware and advanced threats
  • How to use free, open source tools for conducting thorough memory forensics
  • Ways to acquire memory from suspect systems in a forensically sound manner

The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book