Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
Bibliography
Includes bibliographical references and index.
Contents
Malware incident response -- Memory forensics -- Post-mortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.
Note
Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012).