Malware forensic field guide for Linux systems:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781597494700 |
Beschreibung: | Includes index Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597494717 1597494712 9781597494700 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314375 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2014 xx o|||| 00||| eng d | ||
020 | |a 9781597494717 |c electronic bk. |9 978-1-59749-471-7 | ||
020 | |a 1597494712 |c electronic bk. |9 1-59749-471-2 | ||
020 | |a 9781597494700 |9 978-1-59749-470-0 | ||
035 | |a (OCoLC)866931244 | ||
035 | |a (DE-599)BVBBV042314375 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Malin, Cameron H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malware forensic field guide for Linux systems |c Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code | ||
500 | |a Includes bibliographical references and index | ||
630 | 0 | 4 | |a Linux |
650 | 7 | |a COMPUTERS / Operating Systems / Linux |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Linux |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a LINUX |0 (DE-588)4337730-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a LINUX |0 (DE-588)4337730-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Aquilina, James M. |e Sonstige |4 oth | |
700 | 1 | |a Casey, Eoghan |e Sonstige |4 oth | |
700 | 1 | |a Rose, Curtis W. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597494700 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
912 | |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027751366 |
Datensatz im Suchindex
_version_ | 1818979953596694528 |
---|---|
any_adam_object | |
author | Malin, Cameron H. |
author_facet | Malin, Cameron H. |
author_role | aut |
author_sort | Malin, Cameron H. |
author_variant | c h m ch chm |
building | Verbundindex |
bvnumber | BV042314375 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)866931244 (DE-599)BVBBV042314375 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03125nam a2200589zc 4500</leader><controlfield tag="001">BV042314375</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494717</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-471-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494712</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-471-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494700</subfield><subfield code="9">978-1-59749-470-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)866931244</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314375</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensic field guide for Linux systems</subfield><subfield code="c">Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Linux</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rose, Curtis W.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597494700</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751366</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV042314375 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:07:43Z |
institution | BVB |
isbn | 9781597494717 1597494712 9781597494700 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751366 |
oclc_num | 866931244 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Malin, Cameron H. Verfasser aut Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor Waltham, MA Syngress 2014 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code Includes bibliographical references and index Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Computerforensik (DE-588)4774034-6 s LINUX (DE-588)4337730-0 s DE-604 Aquilina, James M. Sonstige oth Casey, Eoghan Sonstige oth Rose, Curtis W. Sonstige oth http://www.sciencedirect.com/science/book/9781597494700 Verlag Volltext |
spellingShingle | Malin, Cameron H. Malware forensic field guide for Linux systems Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4337730-0 (DE-588)4774034-6 (DE-588)4151278-9 |
title | Malware forensic field guide for Linux systems |
title_auth | Malware forensic field guide for Linux systems |
title_exact_search | Malware forensic field guide for Linux systems |
title_full | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_fullStr | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_full_unstemmed | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_short | Malware forensic field guide for Linux systems |
title_sort | malware forensic field guide for linux systems |
topic | Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Linux COMPUTERS / Operating Systems / Linux COMPUTERS / Security / General Computer security Operating systems (Computers) LINUX Computerforensik Einführung |
url | http://www.sciencedirect.com/science/book/9781597494700 |
work_keys_str_mv | AT malincameronh malwareforensicfieldguideforlinuxsystems AT aquilinajamesm malwareforensicfieldguideforlinuxsystems AT caseyeoghan malwareforensicfieldguideforlinuxsystems AT rosecurtisw malwareforensicfieldguideforlinuxsystems |