|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Die Kunst der Gedächtnisforensik: Erkennen von Malware und Bedrohungen in Windows, Li - GUT

BlackBird Bazaar
(3385)
Angemeldet als privater Verkäufer
Verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, finden daher keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
US $21,84
Ca.CHF 17,75
Bisher US $29,12 (- 25%)Was bedeutet dieser Preis?
Aktueller Verkaufspreis (Angabe des Verkäufers)
Artikelzustand:
Gut
Sonderaktion endet in: 5 T 1 Std
Schnell, bevor er weg ist. 1 Person beobachtet diesen Artikel.
Versand:
Kostenlos USPS Media MailTM.
Standort: San Antonio, Texas, USA
Lieferung:
Lieferung zwischen Fr, 27. Jun und Mi, 2. Jul nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
Keine Rücknahme.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:187268773120
Zuletzt aktualisiert am 31. Mai. 2025 16:13:38 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Brand
Unbranded
Book Title
The Art of Memory Forensics: Detecting Malware and Threats in Wi
MPN
Does not apply
Topic
Windows
ISBN
9781118825099

Über dieses Produkt

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118825098
ISBN-13
9781118825099
eBay Product ID (ePID)
201576805

Product Key Features

Number of Pages
912 Pages
Publication Name
Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory
Language
English
Publication Year
2014
Subject
Security / Cryptography, Security / General, Security / Viruses & Malware, Security / Networking, Forensic Science, Criminology
Type
Textbook
Author
Michael Hale Ligh, Aaron Walters, Andrew Case, Jamie Levy
Subject Area
Law, Computers, Social Science
Format
Trade Paperback

Dimensions

Item Height
2.1 in
Item Weight
44.1 Oz
Item Length
9.1 in
Item Width
7.4 in

Additional Product Features

Intended Audience
Trade
LCCN
2014-935751
TitleLeading
The
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
004.50285/58
Synopsis
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes., SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OF DIGITAL ATTACKS The Art of Memory Forensics , a follow-up to the bestselling Malware Analyst s Cookbook , is a practical guide to the rapidly emerging investigative technique for digital forensics, incident response, and law enforcement. Memory forensics has become a must-have skill for combating the next era of advanced malware, targeted attacks, security breaches, and online crime. As breaches and attacks become more sophisticated, analyzing volatile memory becomes ever more critical to the investigative process. This book provides a comprehensive guide to performing memory forensics for Windows, Linux, and Mac systems, including x64 architectures. Based on the authors popular training course, coverage includes memory acquisition, rootkits, tracking user activity, and more, plus case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises, sample memory dumps, and cutting-edge memory forensics software. Memory forensics is the art of analyzing RAM to solve digital crimes. Conventional incident response often overlooks volatile memory, which contains crucial information that can prove or disprove the system s involvement in a crime, and can even destroy it completely. By implementing memory forensics techniques, analysts are able to preserve memory resident artifacts which often provides a more efficient strategy for investigating modern threats. In The Art of Memory Forensics , the Volatility Project s team of experts provides functional guidance and practical advice that helps readers to: Acquire memory from suspect systems in a forensically sound manner Learn best practices for Windows, Linux, and Mac memory forensics Discover how volatile memory analysis improves digital investigations Delineate the proper investigative steps for detecting stealth malware and advanced threats Use free, open source tools to conduct thorough memory forensics investigations Generate timelines, track user activity, find hidden artifacts, and more The companion website provides exercises for each chapter, plus data that can be used to test the various memory analysis techniques in the book. Visit our website at www.wiley.com/go/memoryforensics., Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
LC Classification Number
QA76.9.A25L54 2014

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

BlackBird Bazaar

100% positive Bewertungen9.6 Tsd. Artikel verkauft

Mitglied seit Feb 2009
Antwortet meist innerhalb 24 Stunden
Angemeldet als privater VerkäuferDaher finden verbraucherschützende Vorschriften, die sich aus dem EU-Verbraucherrecht ergeben, keine Anwendung. Der eBay-Käuferschutz gilt dennoch für die meisten Käufe.
Blackbird Bazaar is a one man operation specializing in speedy customer service and excellent prices!Don't miss out on $1 OFFERS sent to Interested BUYERS / ITEM WATCHERS on randomly selected items, ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
5.0
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (3'077)

Alle Bewertungen
Positiv
Neutral
Negativ