Malware forensic field guide for Linux systems:
Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an ea...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781597494700 http://www.sciencedirect.com/science/book/9781597494700 |
Zusammenfassung: | Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code |
Beschreibung: | Includes index Includes bibliographical references and index |
Umfang: | 1 online resource |
ISBN: | 9781597494717 1597494712 1597494704 9781597494700 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126341 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2014 xx o|||| 00||| eng d | ||
020 | |a 9781597494717 |9 978-1-59749-471-7 | ||
020 | |a 1597494712 |9 1-59749-471-2 | ||
020 | |a 1597494704 |9 1-59749-470-4 | ||
020 | |a 9781597494700 |9 978-1-59749-470-0 | ||
035 | |a (ZDB-33-ESD)ocn866931244 | ||
035 | |a (OCoLC)866931244 | ||
035 | |a (DE-599)BVBBV046126341 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a PZ 4700 |0 (DE-625)141182: |2 rvk | ||
084 | |a PZ 5300 |0 (DE-625)141201: |2 rvk | ||
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Malin, Cameron H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Malware forensic field guide for Linux systems |c Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code | ||
630 | 0 | 4 | |a Linux |
650 | 7 | |a COMPUTERS / Operating Systems / Linux |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Linux |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a LINUX |0 (DE-588)4337730-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 1 | |a LINUX |0 (DE-588)4337730-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Aquilina, James M. |4 aut | |
700 | 1 | |a Casey, Eoghan |4 aut | |
700 | 1 | |a Rose, Curtis W. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597494700 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597494700 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031506794 | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597494700 |l DE-860 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818985995094196224 |
---|---|
any_adam_object | |
author | Malin, Cameron H. Aquilina, James M. Casey, Eoghan |
author2 | Rose, Curtis W. |
author2_role | edt |
author2_variant | c w r cw cwr |
author_facet | Malin, Cameron H. Aquilina, James M. Casey, Eoghan Rose, Curtis W. |
author_role | aut aut aut |
author_sort | Malin, Cameron H. |
author_variant | c h m ch chm j m a jm jma e c ec |
building | Verbundindex |
bvnumber | BV046126341 |
classification_rvk | PZ 4700 PZ 5300 ST 261 ST 277 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn866931244 (OCoLC)866931244 (DE-599)BVBBV046126341 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03418nam a2200637zc 4500</leader><controlfield tag="001">BV046126341</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494717</subfield><subfield code="9">978-1-59749-471-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494712</subfield><subfield code="9">1-59749-471-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494704</subfield><subfield code="9">1-59749-470-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494700</subfield><subfield code="9">978-1-59749-470-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn866931244</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)866931244</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126341</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4700</subfield><subfield code="0">(DE-625)141182:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 5300</subfield><subfield code="0">(DE-625)141201:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensic field guide for Linux systems</subfield><subfield code="c">Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Linux</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rose, Curtis W.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597494700</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597494700</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506794</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597494700</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV046126341 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:43:45Z |
institution | BVB |
isbn | 9781597494717 1597494712 1597494704 9781597494700 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506794 |
oclc_num | 866931244 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Malin, Cameron H. Verfasser aut Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor Waltham, MA Syngress 2014 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Computerforensik (DE-588)4774034-6 s LINUX (DE-588)4337730-0 s DE-604 Aquilina, James M. aut Casey, Eoghan aut Rose, Curtis W. edt Erscheint auch als Druck-Ausgabe 9781597494700 http://www.sciencedirect.com/science/book/9781597494700 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Malin, Cameron H. Aquilina, James M. Casey, Eoghan Malware forensic field guide for Linux systems Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4337730-0 (DE-588)4774034-6 (DE-588)4151278-9 |
title | Malware forensic field guide for Linux systems |
title_auth | Malware forensic field guide for Linux systems |
title_exact_search | Malware forensic field guide for Linux systems |
title_full | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_fullStr | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_full_unstemmed | Malware forensic field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor |
title_short | Malware forensic field guide for Linux systems |
title_sort | malware forensic field guide for linux systems |
topic | Linux COMPUTERS / Operating Systems / Linux bisacsh COMPUTERS / Security / General bisacsh Linux fast Computer security fast Operating systems (Computers) fast Operating systems (Computers) Computer security LINUX (DE-588)4337730-0 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Linux COMPUTERS / Operating Systems / Linux COMPUTERS / Security / General Computer security Operating systems (Computers) LINUX Computerforensik Einführung |
url | http://www.sciencedirect.com/science/book/9781597494700 |
work_keys_str_mv | AT malincameronh malwareforensicfieldguideforlinuxsystems AT aquilinajamesm malwareforensicfieldguideforlinuxsystems AT caseyeoghan malwareforensicfieldguideforlinuxsystems AT rosecurtisw malwareforensicfieldguideforlinuxsystems |