Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Chapter 2. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Chapter 4. Legal Considerations
Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Windows System
Chapter 6. Analysis of a Suspect Program
Note: Do Not Use Any eBook Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.
Size: 23.1 MB
No comments:
Post a Comment