|Listed in category:
Have one to sell?

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Li - GOOD

US $21.84
ApproximatelyRM 93.80
Was US $29.12 (25% off)What does this price mean?
Recent sales price provided by the seller
Condition:
Good
Sale ends in: 5d 7h
Hurry before it's gone. 1 person is watching this item.
Shipping:
Free USPS Media MailTM.
Located in: San Antonio, Texas, United States
Delivery:
Estimated between Fri, 27 Jun and Wed, 2 Jul to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
No returns accepted.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:187268773120
Last updated on May 31, 2025 22:13:38 MYTView all revisionsView all revisions

Item specifics

Condition
Good: A book that has been read but is in good condition. Very minimal damage to the cover including ...
Brand
Unbranded
Book Title
The Art of Memory Forensics: Detecting Malware and Threats in Wi
MPN
Does not apply
Topic
Windows
ISBN
9781118825099

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118825098
ISBN-13
9781118825099
eBay Product ID (ePID)
201576805

Product Key Features

Number of Pages
912 Pages
Publication Name
Art of Memory Forensics : Detecting Malware and Threats in Windows, Linux, and Mac Memory
Language
English
Publication Year
2014
Subject
Security / Cryptography, Security / General, Security / Viruses & Malware, Security / Networking, Forensic Science, Criminology
Type
Textbook
Author
Michael Hale Ligh, Aaron Walters, Andrew Case, Jamie Levy
Subject Area
Law, Computers, Social Science
Format
Trade Paperback

Dimensions

Item Height
2.1 in
Item Weight
44.1 Oz
Item Length
9.1 in
Item Width
7.4 in

Additional Product Features

Intended Audience
Trade
LCCN
2014-935751
TitleLeading
The
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
004.50285/58
Synopsis
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes., SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OF DIGITAL ATTACKS The Art of Memory Forensics , a follow-up to the bestselling Malware Analyst s Cookbook , is a practical guide to the rapidly emerging investigative technique for digital forensics, incident response, and law enforcement. Memory forensics has become a must-have skill for combating the next era of advanced malware, targeted attacks, security breaches, and online crime. As breaches and attacks become more sophisticated, analyzing volatile memory becomes ever more critical to the investigative process. This book provides a comprehensive guide to performing memory forensics for Windows, Linux, and Mac systems, including x64 architectures. Based on the authors popular training course, coverage includes memory acquisition, rootkits, tracking user activity, and more, plus case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises, sample memory dumps, and cutting-edge memory forensics software. Memory forensics is the art of analyzing RAM to solve digital crimes. Conventional incident response often overlooks volatile memory, which contains crucial information that can prove or disprove the system s involvement in a crime, and can even destroy it completely. By implementing memory forensics techniques, analysts are able to preserve memory resident artifacts which often provides a more efficient strategy for investigating modern threats. In The Art of Memory Forensics , the Volatility Project s team of experts provides functional guidance and practical advice that helps readers to: Acquire memory from suspect systems in a forensically sound manner Learn best practices for Windows, Linux, and Mac memory forensics Discover how volatile memory analysis improves digital investigations Delineate the proper investigative steps for detecting stealth malware and advanced threats Use free, open source tools to conduct thorough memory forensics investigations Generate timelines, track user activity, find hidden artifacts, and more The companion website provides exercises for each chapter, plus data that can be used to test the various memory analysis techniques in the book. Visit our website at www.wiley.com/go/memoryforensics., Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
LC Classification Number
QA76.9.A25L54 2014

Item description from the seller

About this seller

BlackBird Bazaar

100% positive feedback9.6K items sold

Joined Feb 2009
Usually responds within 24 hours
Blackbird Bazaar is a one man operation specializing in speedy customer service and excellent prices!Don't miss out on $1 OFFERS sent to Interested BUYERS / ITEM WATCHERS on randomly selected items, ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
5.0
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
5.0

Seller feedback (3,076)

All ratings
Positive
Neutral
Negative