Malware forensics field guide for Windows systems digital forensics field guides

Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Malin, Cameron H. (VerfasserIn)
Weitere Verfasser: Casey, Eoghan (MitwirkendeR), Aquilina, James M. (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Waltham, MA Syngress 2012
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-04764785X
003 DE-627-1
005 20240228114954.0
007 cr uuu---uuuuu
008 191023s2012 xx |||||o 00| ||eng c
020 |a 9781597494724  |c electronic bk.  |9 978-1-59749-472-4 
020 |a 1597494720  |c electronic bk.  |9 1-59749-472-0 
020 |a 9781597494731  |9 978-1-59749-473-1 
020 |a 1597494739  |9 1-59749-473-9 
035 |a (DE-627-1)04764785X 
035 |a (DE-599)KEP04764785X 
035 |a (ORHE)9781597494724 
035 |a (DE-627-1)04764785X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8/4  |2 23 
100 1 |a Malin, Cameron H.  |e VerfasserIn  |4 aut 
245 1 0 |a Malware forensics field guide for Windows systems  |b digital forensics field guides  |c Cameron H. Malin, Eoghan Casey, James M. Aquilina 
264 1 |a Waltham, MA  |b Syngress  |c 2012 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012) 
520 |a Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips. 
630 2 0 |a Microsoft Windows (Computer file) 
650 0 |a Malware (Computer software) 
650 0 |a Computer viruses 
650 0 |a Computer security 
650 0 |a Computer crimes  |x Investigation 
650 4 |a Microsoft Windows (Computer file) 
650 4 |a Microsoft Windows (Computer file) 
650 4 |a Logiciels malveillants 
650 4 |a Virus informatiques 
650 4 |a Sécurité informatique 
650 4 |a Criminalité informatique ; Enquêtes 
650 4 |a Computer crimes ; Investigation 
650 4 |a Computer security 
650 4 |a Computer viruses 
650 4 |a Malware (Computer software) 
700 1 |a Casey, Eoghan  |e MitwirkendeR  |4 ctb 
700 1 |a Aquilina, James M.  |e MitwirkendeR  |4 ctb 
776 1 |z 9781597494724 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781597494724 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781597494724/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-04764785X
_version_ 1818767301033328640
adam_text
any_adam_object
author Malin, Cameron H.
author2 Casey, Eoghan
Aquilina, James M.
author2_role ctb
ctb
author2_variant e c ec
j m a jm jma
author_facet Malin, Cameron H.
Casey, Eoghan
Aquilina, James M.
author_role aut
author_sort Malin, Cameron H.
author_variant c h m ch chm
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)04764785X
(DE-599)KEP04764785X
(ORHE)9781597494724
dewey-full 005.8/4
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8/4
dewey-search 005.8/4
dewey-sort 15.8 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02627cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-04764785X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114954.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494724</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-472-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494720</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-472-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494731</subfield><subfield code="9">978-1-59749-473-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597494739</subfield><subfield code="9">1-59749-473-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764785X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04764785X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597494724</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764785X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Malin, Cameron H.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Malware forensics field guide for Windows systems</subfield><subfield code="b">digital forensics field guides</subfield><subfield code="c">Cameron H. Malin, Eoghan Casey, James M. Aquilina</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virus informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Enquêtes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Casey, Eoghan</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aquilina, James M.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597494724</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597494724</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597494724/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-04764785X
illustrated Not Illustrated
indexdate 2024-12-18T08:47:42Z
institution BVB
isbn 9781597494724
1597494720
9781597494731
1597494739
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Syngress
record_format marc
spelling Malin, Cameron H. VerfasserIn aut
Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
Waltham, MA Syngress 2012
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Online resource; title from publisher's Web site (ScienceDirect, viewed on June 1, 2012)
Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, this book contains checklists for specific tasks, case studies of difficult situations, and expert analyst tips.
Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Computer crimes Investigation
Logiciels malveillants
Virus informatiques
Sécurité informatique
Criminalité informatique ; Enquêtes
Computer crimes ; Investigation
Casey, Eoghan MitwirkendeR ctb
Aquilina, James M. MitwirkendeR ctb
9781597494724
Erscheint auch als Druck-Ausgabe 9781597494724
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781597494724/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Malin, Cameron H.
Malware forensics field guide for Windows systems digital forensics field guides
Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Computer crimes Investigation
Logiciels malveillants
Virus informatiques
Sécurité informatique
Criminalité informatique ; Enquêtes
Computer crimes ; Investigation
title Malware forensics field guide for Windows systems digital forensics field guides
title_auth Malware forensics field guide for Windows systems digital forensics field guides
title_exact_search Malware forensics field guide for Windows systems digital forensics field guides
title_full Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
title_fullStr Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
title_full_unstemmed Malware forensics field guide for Windows systems digital forensics field guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
title_short Malware forensics field guide for Windows systems
title_sort malware forensics field guide for windows systems digital forensics field guides
title_sub digital forensics field guides
topic Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Computer crimes Investigation
Logiciels malveillants
Virus informatiques
Sécurité informatique
Criminalité informatique ; Enquêtes
Computer crimes ; Investigation
topic_facet Microsoft Windows (Computer file)
Malware (Computer software)
Computer viruses
Computer security
Computer crimes Investigation
Logiciels malveillants
Virus informatiques
Sécurité informatique
Criminalité informatique ; Enquêtes
Computer crimes ; Investigation
url https://learning.oreilly.com/library/view/-/9781597494724/?ar
work_keys_str_mv AT malincameronh malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides
AT caseyeoghan malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides
AT aquilinajamesm malwareforensicsfieldguideforwindowssystemsdigitalforensicsfieldguides