Get Free Shipping on orders over $79
Linux Malware Incident Response : A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - Eoghan Casey

Linux Malware Incident Response

A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

By: Eoghan Casey, Cameron H. Malin, James M. Aquilina

Paperback | 8 March 2013 | Edition Number 1

At a Glance

Paperback


$31.95

or 4 interest-free payments of $7.99 with

 or 

Ships in 5 to 7 business days

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
  • Presented in a succinct outline format with cross-references to included supplemental components and appendices
  • Covers volatile data collection methodology as well as non-volatile data collection from a live Linux system
  • Addresses malware artifact discovery and extraction from a live Linux system

More in Network Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Cyberethics - Richard A. Spinello

Paperback

$119.75

Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Tech-Smart Parenting : How to keep your kids happy and safe online - Catherine Knibbs
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Zero Trust Security : A Hands-on Guide - Adam Tilmar Jakobsen
Internet of Multimedia Things Security : Tools and Applications - PhD  Preethi
Linux Command Line and Shell Scripting Bible : Bible - Richard Blum