Record ID | marc_nuls/NULS_PHC_180925.mrc:67278301:2049 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:67278301:2049?format=raw |
LEADER: 02049cam 2200337Ia 4500
001 9921082990001661
005 20150423133058.0
008 080218s2008 maua b 000 0 eng d
020 $a159749268X (pbk. )
020 $a9781597492683 (pbk. )
035 $a(CSdNU)u331262-01national_inst
035 $a(OCoLC)192082631
035 $a(OCoLC)192082631
035 $a(OCoLC)192082631
040 $aYDXCP$cYDXCP$dBTCTA$dBAKER$dBWX$dCDX$dIXA$dOrLoB-B
049 $aCNUM
050 4 $aQA76.9.A25$bA68 2008
082 04 $a005.8
100 1 $aAquilina, James M.
245 00 $aMalware forensics :$binvestigating and analyzing malicious code / $cJames M. Aquilina, Eoghan Casey, Cameron H. Malin.
260 $aBurlington, MA :$bSyngress Publishing,$c2008.
300 $axxxvi, 874 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aCh. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System -- Ch. 2. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System -- Ch. 3. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts -- Ch. 4. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems -- Ch. 5. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems -- Ch. 6. Legal Considerations -- Ch. 7. File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System -- Ch. 8. File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System -- Ch. 9. Analysis of a Suspect Program: Windows -- Ch. 10. Analysis of a Suspect Program: Linux.
650 0 $aComputer security.
650 0 $aComputer viruses$xIdentification.
650 0 $aComputer crimes$xInvestigation.
700 1 $aCasey, Eoghan.
700 1 $aMalin, Cameron H.
994 $aC0$bCNU
999 $aQA 76.9 .A25 A68 2008$wLC$c1$i31786102430078$d12/5/2008$lCIRCSTACKS $mNULS$q1$rY$sY$tBOOK$u8/27/2008