Description |
1 online resource (x, 236 pages) : illustrations |
Contents |
Ch. 1. Introduction -- Ch. 2. Understanding Unix -- Ch. 3. Live Response: Data Collection -- Ch. 4. Initial Triage and Live Response: Data Analysis -- Ch. 5. The Hacking Top 10 -- Ch. 6. The /Proc File System -- Ch. 7. File Analysis -- Ch. 8. Malware -- Appendix. Implementing Cybercrime Detection Techniques on Windows and *nix |
Summary |
"The book begins with an introduction to Linux and UNIX written with experienced Windows forensic analysts in mind. Next, the book covers the issues of live response, (volatile) data collection and analysis, analyzing the contents of physical memory, /proc analysis, malware coders, anti-forensic developers. Investigators will learn to compile all of this information to perform a comprehensive forensic analysis. The authors draw on familiar aspects of Windows to explain how UNIX and UNIX-like systems such as Linux operate similarly and where *nix systems differ significantly. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else."--Jacket |
Notes |
Includes index |
|
Print version record |
SUBJECT |
UNIX (Computer file) http://id.loc.gov/authorities/names/n91019960
|
|
Linux. http://id.loc.gov/authorities/names/n94087892
|
|
UNIX (Computer file) blmlsh |
|
Linux. blmlsh |
|
Linux fast |
|
UNIX (Computer file) fast |
Subject |
Computer crimes -- Investigation.
|
|
Forensic sciences.
|
|
Operating systems (Computers)
|
|
forensic science.
|
|
operating systems.
|
|
LAW -- Forensic Science.
|
|
Computer crimes -- Investigation.
|
|
Forensic sciences.
|
|
Operating systems (Computers)
|
|
Computer crimes -- Investigation
|
|
Forensic sciences
|
|
Operating systems (Computers)
|
Form |
Electronic book
|
Author |
Altheide, Cory
|
|
Haverkos, Todd
|
ISBN |
9780080879123 |
|
0080879128 |
|
1282285203 |
|
9781282285200 |
|