Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems
eBook Details:
- Paperback: 134 pages
- Publisher: WOW! eBook; 1st edition (March 22, 2013)
- Language: English
- ISBN-10: 0124095070
- ISBN-13: 978-0124095076
eBook Description:
Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems
- Presented in a succinct outline format with cross-references to included supplemental components and appendices
- Covers volatile data collection methodology as well as non-volatile data collection from a live Linux system
- Addresses malware artifact discovery and extraction from a live Linux system
Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems
Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems is a “first look” at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The WOW! eBook Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a “toolkit” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems
- Presented in a succinct outline format with cross-references to included supplemental components and appendices
- Covers volatile data collection methodology as well as non-volatile data collection from a live Linux system
- Addresses malware artifact discovery and extraction from a live Linux system
Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems is a “first look” at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The WOW! eBook Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a “toolkit” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
[download id=”2095″]