Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware Forensics: Investigating and Analyzing Malicious Code

Buy

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and investigating its origin and authors. Written by information security experts with real-world investigative experience, Malware Forensics: Investigating and Analyzing Malicious Code is the most instructional book available on the subject, providing practical step-by-step technical and legal guidance to readers by featuring tools, diagrams, examples, exercises and checklists.

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.

Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.

Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical ?how-to? aspect of malicious code investigation, giving deep coverage on the design of a malicious code analysis lab, the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.

After learning the tools and techniques covered in the book?s earlier chapters, the final chapters of Malware Forensics: Investigating and Analyzing Malicious Code focus on using honeypots to collect malicious code in the wild and conducting technical profiling and threat assessment based upon malicious code analysis findings.

* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform ?live forensic? techniques on malicous code.
* Companion Web site provides working code for analysis.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

About the Author

Cameron H. Malin is Special Agent with the Federal Bureau of Investigation assigned to a Cyber Crime squad in Los Angeles, California, where he is responsible for the investigation of computer intrusion and malicious code matters. Special Agent Malin is the founder and developer of the FBIs Technical Working Group on Malware Analysis and Incident Response. Special Agent Malin is a Certified Ethical Hacker (C|EH) as designated by the International Council of E-Commerce Consultants, a Certified Information Systems Security Professional (CISSP), as designated by the International Information Systems Security Consortium, a GIAC certified Reverse-Engineering Malware Professional (GREM), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), and a GIAC Certified Forensic Analyst (GCFA), as designated by the SANS Institute. Eoghan Casey is currently a computer security and computer crime consultant based in Baltimor, MD, USA.

(HTML tags aren't allowed.)

The Definitive Guide to db4o
The Definitive Guide to db4o

To satisfy the demand for 24/7 information access, applications available in airport and conference kiosks, and in the mobile, gaming, and medical industries, provide consumers data access wherever they are. But it's essential that fast availability not be traded for quality performance.

A prominent solution for managing the data in...

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

The Portable MBA in Finance and Accounting
The Portable MBA in Finance and Accounting
The latest volume in the bestselling series

In today's business environment, a knowledge of finance and skills in budgeting and financial planning are more important than ever before. Totally updated and revised, this highly anticipated Third Edition provides new information on five such key topics as interpreting financial
...

The Worlds Most Haunted Places: From The Secret Files Of Ghostvillage.com
The Worlds Most Haunted Places: From The Secret Files Of Ghostvillage.com
Ghostly legends abound wherever history has made its mark-from battlefields to monuments, prisons to inns. If these places have existed for centuries or more, and if they are where history-especially tragic history-was made, ghost stories will inevitably follow. The World's Most Haunted Places: From the Secret Files of Ghostvillage.com explores...
Introduction to Statistical Relational Learning (Adaptive Computation and Machine Learning)
Introduction to Statistical Relational Learning (Adaptive Computation and Machine Learning)
Handling inherent uncertainty and exploiting compositional structure are fundamental to understanding and designing large-scale systems. Statistical relational learning builds on ideas from probability theory and statistics to address uncertainty while incorporating tools from logic, databases, and programming languages to represent structure. In...
Getting Started in Clinical Radiology: From Image to Diagnosis
Getting Started in Clinical Radiology: From Image to Diagnosis
I read the book for enjoyment and pleasure, as well as enlightenment. It was a delightful learning experience.

--Thomas Lee Bucky, MD

This book teaches radiology in a way that mimics a lively setting on the wards. To have fun in learning the theoretical basis of imaging and the interpretation of radiographs and other...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy