0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

The Event of Style in Literature (Hardcover): M. Aquilina The Event of Style in Literature (Hardcover)
M. Aquilina
R2,870 R1,834 Discovery Miles 18 340 Save R1,036 (36%) Ships in 12 - 17 working days

The Event of Style in Literature brings discussions about the question of style up-to-date by schematising the principal issues relating to the topic through a critical overview of the canon of style studies. It reads the work of Jacques Derrida, Maurice Blanchot, and Hans-Georg Gadamer as groundbreaking and 'eventful' interventions.

The Event of Style in Literature (Paperback, 1st ed. 2014): M. Aquilina The Event of Style in Literature (Paperback, 1st ed. 2014)
M. Aquilina
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The Event of Style in Literature brings discussions about the question of style up-to-date by schematising the principal issues relating to the topic through a critical overview of the canon of style studies. It reads the work of Jacques Derrida, Maurice Blanchot, and Hans-Georg Gadamer as groundbreaking and 'eventful' interventions.

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R394 Discovery Miles 3 940 Ships in 12 - 17 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Malware Forensics - Investigating and Analyzing Malicious Code (Paperback): Cameron H. Malin, Eoghan Casey, James M. Aquilina Malware Forensics - Investigating and Analyzing Malicious Code (Paperback)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,513 Discovery Miles 15 130 Ships in 12 - 17 working days

"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code" also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, "Malware Forensics: Investigating and Analyzing Malicious Code" emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.
* Winner of Best Book Bejtlich read in 2008
* http: //taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New): Cameron H. Malin, Eoghan... Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,384 R1,201 Discovery Miles 12 010 Save R183 (13%) Ships in 12 - 17 working days

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Clear (50ml)
R57 Discovery Miles 570
Pritt Wood & Craft Glue (100ml)
R42 Discovery Miles 420
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Poor Things
Emma Stone, Mark Ruffalo, … DVD R343 Discovery Miles 3 430
Vital BabyŽ HYGIENE™ Super Soft Hand…
R45 Discovery Miles 450
Pulse Active Flat Cone (18cm)
R99 Discovery Miles 990
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
Elecstor E27 7W Rechargeable LED Bulb…
R399 R349 Discovery Miles 3 490

 

Partners