0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R413 Discovery Miles 4 130 Ships in 12 - 17 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Malware Forensics - Investigating and Analyzing Malicious Code (Paperback): Cameron H. Malin, Eoghan Casey, James M. Aquilina Malware Forensics - Investigating and Analyzing Malicious Code (Paperback)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,581 Discovery Miles 15 810 Ships in 12 - 17 working days

"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code" also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, "Malware Forensics: Investigating and Analyzing Malicious Code" emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.
* Winner of Best Book Bejtlich read in 2008
* http: //taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,625 R1,518 Discovery Miles 15 180 Save R107 (7%) Ships in 12 - 17 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New): Cameron H. Malin, Eoghan... Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,384 R1,255 Discovery Miles 12 550 Save R129 (9%) Ships in 12 - 17 working days

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cricut Explore Air 2 Machine
 (1)
R5,349 R3,783 Discovery Miles 37 830
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Faber-Castell Junior Triangular Colour…
R86 R79 Discovery Miles 790
Huntlea Original Two Tone Pillow Bed…
R650 R565 Discovery Miles 5 650
Pineware Steam, Spray & Dry Iron (Blue…
R199 R187 Discovery Miles 1 870
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,775 R899 Discovery Miles 8 990
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Bunty 380GSM Golf Towel (30x50cm)(3…
R500 R255 Discovery Miles 2 550
White Glo Eco-Friendly Bio Degradeable…
R70 Discovery Miles 700

 

Partners