The Art of Memory Forensics Detecting Malware and Threats in Windows, Linux, and Mac Memory 1st Edition
Material type:
TextPublication details: Canada 2014 WileyDescription: xv, 886pISBN: - 9781118825099
- Artificial Intelligence
- Computer Science
- Creative Technology
- Cybersecurityt
- Data Science
- Memory forensics Malware (Computer software) — Detection Computer security — Threat detection Threat modeling (Computer security) Digital forensics Cybercrime — Investigation Malware analysis Windows (Computer file) — Security measures Linux (Computer file) — Security measures Mac OS (Computer file) — Security measures Computer viruses — Detection Computer security — Investigation Cybersecurity — Tools and techniques Hacking — Prevention Intrusion detection systems (Computer security)
- Programing
- Software Engineering
- 005.8 LIG-A
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Air University Central Library Islamabad | Cyber Security | 005.8 LIG-A (Browse shelf(Opens below)) | Available | P14207 |
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics―now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:
There are no comments on this title.







