Malware forensics field guide for Windows systems digital forensics field guides
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2012
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04764785X | ||
003 | DE-627-1 | ||
005 | 20240228114954.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781597494724 |c electronic bk. |9 978-1-59749-472-4 | ||
020 | |a 1597494720 |c electronic bk. |9 1-59749-472-0 | ||
020 | |a 9781597494731 |9 978-1-59749-473-1 | ||
020 | |a 1597494739 |9 1-59749-473-9 | ||
035 | |a (DE-627-1)04764785X | ||
035 | |a (DE-599)KEP04764785X | ||
035 | |a (ORHE)9781597494724 | ||
035 | |a (DE-627-1)04764785X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/4 |2 23 | |
100 | 1 | |a Malin, Cameron H. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Malware forensics field guide for Windows systems |b digital forensics field guides |c Cameron H. Malin, Eoghan Casey, James M. Aquilina |
264 | 1 | |a Waltham, MA |b Syngress |c 2012 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012) | ||
520 | |a Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips. | ||
630 | 2 | 0 | |a Microsoft Windows (Computer file) |
650 | 0 | |a Malware (Computer software) | |
650 | 0 | |a Computer viruses | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes |x Investigation | |
650 | 4 | |a Microsoft Windows (Computer file) | |
650 | 4 | |a Microsoft Windows (Computer file) | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Virus informatiques | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Criminalité informatique ; Enquêtes | |
650 | 4 | |a Computer crimes ; Investigation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer viruses | |
650 | 4 | |a Malware (Computer software) | |
700 | 1 | |a Casey, Eoghan |e MitwirkendeR |4 ctb | |
700 | 1 | |a Aquilina, James M. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597494724 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597494724 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597494724/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04764785X |
---|---|
_version_ | 1818767301033328640 |
adam_text | |
any_adam_object | |
author | Malin, Cameron H. |
author2 | Casey, Eoghan Aquilina, James M. |
author2_role | ctb ctb |
author2_variant | e c ec j m a jm jma |
author_facet | Malin, Cameron H. Casey, Eoghan Aquilina, James M. |
author_role | aut |
author_sort | Malin, Cameron H. |
author_variant | c h m ch chm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04764785X (DE-599)KEP04764785X (ORHE)9781597494724 |
dewey-full | 005.8/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/4 |
dewey-search | 005.8/4 |
dewey-sort | 15.8 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02627cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-04764785X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114954.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494724</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-472-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494720</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-472-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494731</subfield><subfield code="9">978-1-59749-473-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494739</subfield><subfield code="9">1-59749-473-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764785X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04764785X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597494724</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764785X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensics field guide for Windows systems</subfield><subfield code="b">digital forensics field guides</subfield><subfield code="c">Cameron H. Malin, Eoghan Casey, James M. Aquilina</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virus informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597494724</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597494724</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597494724/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04764785X |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:42Z |
institution | BVB |
isbn | 9781597494724 1597494720 9781597494731 1597494739 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Malin, Cameron H. VerfasserIn aut Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina Waltham, MA Syngress 2012 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012) Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips. Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Computer crimes Investigation Logiciels malveillants Virus informatiques Sécurité informatique Criminalité informatique ; Enquêtes Computer crimes ; Investigation Casey, Eoghan MitwirkendeR ctb Aquilina, James M. MitwirkendeR ctb 9781597494724 Erscheint auch als Druck-Ausgabe 9781597494724 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781597494724/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Malin, Cameron H. Malware forensics field guide for Windows systems digital forensics field guides Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Computer crimes Investigation Logiciels malveillants Virus informatiques Sécurité informatique Criminalité informatique ; Enquêtes Computer crimes ; Investigation |
title | Malware forensics field guide for Windows systems digital forensics field guides |
title_auth | Malware forensics field guide for Windows systems digital forensics field guides |
title_exact_search | Malware forensics field guide for Windows systems digital forensics field guides |
title_full | Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_fullStr | Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_full_unstemmed | Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina |
title_short | Malware forensics field guide for Windows systems |
title_sort | malware forensics field guide for windows systems digital forensics field guides |
title_sub | digital forensics field guides |
topic | Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Computer crimes Investigation Logiciels malveillants Virus informatiques Sécurité informatique Criminalité informatique ; Enquêtes Computer crimes ; Investigation |
topic_facet | Microsoft Windows (Computer file) Malware (Computer software) Computer viruses Computer security Computer crimes Investigation Logiciels malveillants Virus informatiques Sécurité informatique Criminalité informatique ; Enquêtes Computer crimes ; Investigation |
url | https://learning.oreilly.com/library/view/-/9781597494724/?ar |
work_keys_str_mv | AT malincameronh malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides AT caseyeoghan malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides AT aquilinajamesm malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides |