The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst’s Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics?now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

$19.99

10 in stock

Secure Payments

Pay with the worlds payment methods.

Discount Available

Covers payment and purchase gifts.

100% Money-Back Guarantee

Need Help?

(484) 414-5835

Share Our Wines With Your Friends & Family

Description

Editorial Reviews

From the Inside Flap

There is analysis for the next wave of digital attacks.

The art of forensic memory. A follow-up to the bestselling. The Cookbook of the Malware analyst. Digital forensics, incident response, and law enforcement can all benefit from this guide. The next era of advanced malware, targeted attacks, security breeches, and online crime requires memory forensics to be a must-have skill. As attacks become more sophisticated, analyzing volatile memory becomes even more important to the investigative process. There is a guide to performing memory forensics for Windows, Linux, and Mac systems. Coverage includes memory acquisition, rootkits, tracking user activity, and more, as well as case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises and sample memory dumps.

Digital crimes can be solved using memory forensics. Conventional incident response ignores volatile memory, which contains crucial information that can prove or disprove the system?s involvement in a crime, and can even destroy it completely. By using memory forensics techniques, analysts are able to preserve memory resident artifacts which can be used to investigate modern threats.

In. The art of forensic memory. Functional guidance and practical advice is provided by the team of experts.

  • Acquire memory from suspect systems in a forensically sound manner
  • Learn best practices for Windows, Linux, and Mac memory forensics
  • Discover how volatile memory analysis improves digital investigations
  • Delineate the proper investigative steps for detecting stealth malware and advanced threats
  • Use free, open source tools to conduct thorough memory forensics investigations
  • Generate timelines, track user activity, find hidden artifacts, and more

The data that can be used to test the various memory analysis techniques in the book can be found on the companion website. We have a website at www.wiley.com/go/memoryforensics.

–This text refers to the paperback edition.

From the Back Cover

There is analysis for the next wave of digital attacks.

The art of forensic memory. A follow-up to the bestselling. The Cookbook of the Malware analyst. Digital forensics, incident response, and law enforcement can all benefit from this guide. The next era of advanced malware, targeted attacks, security breeches, and online crime requires memory forensics to be a must-have skill. As attacks become more sophisticated, analyzing volatile memory becomes even more important to the investigative process. There is a guide to performing memory forensics for Windows, Linux, and Mac systems. Coverage includes memory acquisition, rootkits, tracking user activity, and more, as well as case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises and sample memory dumps.

Digital crimes can be solved using memory forensics. Conventional incident response ignores volatile memory, which contains crucial information that can prove or disprove the system?s involvement in a crime, and can even destroy it completely. By using memory forensics techniques, analysts are able to preserve memory resident artifacts which can be used to investigate modern threats.

In. The art of forensic memory. Functional guidance and practical advice is provided by the team of experts.

  • Acquire memory from suspect systems in a forensically sound manner
  • Learn best practices for Windows, Linux, and Mac memory forensics
  • Discover how volatile memory analysis improves digital investigations
  • Delineate the proper investigative steps for detecting stealth malware and advanced threats
  • Use free, open source tools to conduct thorough memory forensics investigations
  • Generate timelines, track user activity, find hidden artifacts, and more

The data that can be used to test the various memory analysis techniques in the book can be found on the companion website. We have a website at www.wiley.com/go/memoryforensics.

–This text refers to the paperback edition.

About the Author

Michael Hale-Ligh is author of Malware Analyst’s Cookbook, Secretary/Treasurer of Volatility Foundation, and a world-class reverse engineer.

Andrew Case. Digital forensics researcher specializing in memory, disk, and network forensics.

Jamie Levy. He is a senior researcher and developer.

AAron Walters. He is the founder and lead developer of the Volatility Project.

–This text refers to the paperback edition.

Read more

Additional information

Best Sellers Rank

#538,482 in Kindle Store (See Top 100 in Kindle Store) #85 in Viruses & Malware #106 in Encryption #185 in Network Security

Customer Reviews

/* * Fix for UDP-1061. Average customer reviews has a small extra line on hover * https

Reviews

There are no reviews yet.

Be the first to review “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory”

Your email address will not be published. Required fields are marked *