0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

The Event of Style in Literature (Hardcover): M. Aquilina The Event of Style in Literature (Hardcover)
M. Aquilina
R2,870 R1,834 Discovery Miles 18 340 Save R1,036 (36%) Ships in 12 - 17 working days

The Event of Style in Literature brings discussions about the question of style up-to-date by schematising the principal issues relating to the topic through a critical overview of the canon of style studies. It reads the work of Jacques Derrida, Maurice Blanchot, and Hans-Georg Gadamer as groundbreaking and 'eventful' interventions.

The Event of Style in Literature (Paperback, 1st ed. 2014): M. Aquilina The Event of Style in Literature (Paperback, 1st ed. 2014)
M. Aquilina
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The Event of Style in Literature brings discussions about the question of style up-to-date by schematising the principal issues relating to the topic through a critical overview of the canon of style studies. It reads the work of Jacques Derrida, Maurice Blanchot, and Hans-Georg Gadamer as groundbreaking and 'eventful' interventions.

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R394 Discovery Miles 3 940 Ships in 12 - 17 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Malware Forensics - Investigating and Analyzing Malicious Code (Paperback): Cameron H. Malin, Eoghan Casey, James M. Aquilina Malware Forensics - Investigating and Analyzing Malicious Code (Paperback)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,513 Discovery Miles 15 130 Ships in 12 - 17 working days

"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code" also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, "Malware Forensics: Investigating and Analyzing Malicious Code" emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.
* Winner of Best Book Bejtlich read in 2008
* http: //taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New): Cameron H. Malin, Eoghan... Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,384 R1,201 Discovery Miles 12 010 Save R183 (13%) Ships in 12 - 17 working days

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Attached - Are You Anxious, Avoidant Or…
Amir Levine, Rachel Heller Paperback  (1)
R299 R234 Discovery Miles 2 340
The History of Colour - A Universe of…
Neil Parkinson Hardcover R509 R461 Discovery Miles 4 610
The Secret Society of Success - Stop…
Tim Schurrer Paperback R399 R329 Discovery Miles 3 290
Grit - Why Passion & Resilience Are The…
Angela Duckworth Paperback  (3)
R345 R270 Discovery Miles 2 700
The Gift of Who I Am - Living Prayer…
Christine Black Cummings Paperback R370 R305 Discovery Miles 3 050
Happier Hour - How to Beat Distraction…
Cassie Holmes Paperback R466 R391 Discovery Miles 3 910
Reflections Concerning the Imitation of…
Johann Joachim Winckelmann Paperback R305 Discovery Miles 3 050
Own Your Awkward - How To Have Better…
Michelle Morgan Paperback R427 Discovery Miles 4 270
The Book of Small
Emily Carr Hardcover R597 Discovery Miles 5 970
Speak - Find Your Voice, Trust Your Gut…
Tunde Oyeneyin Paperback R428 R355 Discovery Miles 3 550

 

Partners