Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware Forensics: Investigating and Analyzing Malicious Code

Buy

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and investigating its origin and authors. Written by information security experts with real-world investigative experience, Malware Forensics: Investigating and Analyzing Malicious Code is the most instructional book available on the subject, providing practical step-by-step technical and legal guidance to readers by featuring tools, diagrams, examples, exercises and checklists.

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.

Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.

Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical ?how-to? aspect of malicious code investigation, giving deep coverage on the design of a malicious code analysis lab, the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.

After learning the tools and techniques covered in the book?s earlier chapters, the final chapters of Malware Forensics: Investigating and Analyzing Malicious Code focus on using honeypots to collect malicious code in the wild and conducting technical profiling and threat assessment based upon malicious code analysis findings.

* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform ?live forensic? techniques on malicous code.
* Companion Web site provides working code for analysis.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

About the Author

Cameron H. Malin is Special Agent with the Federal Bureau of Investigation assigned to a Cyber Crime squad in Los Angeles, California, where he is responsible for the investigation of computer intrusion and malicious code matters. Special Agent Malin is the founder and developer of the FBIs Technical Working Group on Malware Analysis and Incident Response. Special Agent Malin is a Certified Ethical Hacker (C|EH) as designated by the International Council of E-Commerce Consultants, a Certified Information Systems Security Professional (CISSP), as designated by the International Information Systems Security Consortium, a GIAC certified Reverse-Engineering Malware Professional (GREM), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), and a GIAC Certified Forensic Analyst (GCFA), as designated by the SANS Institute. Eoghan Casey is currently a computer security and computer crime consultant based in Baltimor, MD, USA.

(HTML tags aren't allowed.)

Essentials Of Chemical Biology: Structure and Dynamics of Biological Macromolecules
Essentials Of Chemical Biology: Structure and Dynamics of Biological Macromolecules

“This excellent work fills the need for an upper-level graduate course resource that examines the latest biochemical, biophysical, and molecular biological methods for analyzing the structures and physical properties of biomolecules… This reviewer showed [the book] to several of his senior graduate students, and they...

Reoviruses: Entry, Assembly and Morphogenesis (Current Topics in Microbiology and Immunology)
Reoviruses: Entry, Assembly and Morphogenesis (Current Topics in Microbiology and Immunology)

A review of our current understanding of Reoviridae entry, disassembly/assembly and egress in addition to updating high resolution structures of virus proteins and capsids from three different genera of the family. Most of our initial understanding of molecular biology and processes involved in virus replication and pathogenesis for the...

Acting Lessons for Teachers
Acting Lessons for Teachers
We love teaching. Both your authors and you, the readers, love the classroom experience. We accept that the students don’t always learn as much or as readily as we might have hoped, and we accept that we might not have executed a planned lesson as smoothly as we had hoped. But we still love the excitement of the first day, the thrill of...

DevOps for Azure Applications: Deploy Web Applications on Azure
DevOps for Azure Applications: Deploy Web Applications on Azure
Deploy web applications on Azure using DevOps tools. This book gives solutions to real-world Cloud deployment scenarios which will enable you to become adept in DevOps work for Azure.

You'll start by seeing an overview of DevOps for Azure deployments where you will also survey the available tools,
...
OpenGL® Shading Language, Second Edition
OpenGL® Shading Language, Second Edition

OpenGL® Shading Language, Second Edition, extensively updated for OpenGL 2.0, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics...

Pragmatic Ajax: A Web 2.0 Primer
Pragmatic Ajax: A Web 2.0 Primer
This is a book about developing effective web applications. We’re not
going to dance around this issue. Underneath everything else, this
book is about XHTML, JavaScript, CSS, and standards that have been
around for almost a decade now. Not only do we admit this truth,
we embrace it. Just because these standards have been
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy