The Art of Memory Forensics
Detecting Malware and Threats in Windows, Linux, and Mac Memory
By Michael Ligh, Andrew Case, Jamie Levy, AAron Walters
Publisher: Wiley
Final Release Date: July 2014
Pages: 912

SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OFDIGITAL ATTACKS

The Art of Memory Forensics, a follow-up to thebestselling Malware Analyst’s Cookbook, is a practicalguide to the rapidly emerging investigative technique for digitalforensics, incident response, and law enforcement. Memory forensicshas become a must-have skill for combating the next era of advancedmalware, targeted attacks, security breaches, and online crime. Asbreaches and attacks become more sophisticated, analyzing volatilememory becomes ever more critical to the investigative process.This book provides a comprehensive guide to performing memoryforensics for Windows, Linux, and Mac systems, including x64architectures. Based on the authors’ popular training course,coverage includes memory acquisition, rootkits, tracking useractivity, and more, plus case studies that illustrate thereal-world application of the techniques presented. Bonus materialsinclude industry-applicable exercises, sample memory dumps, andcutting-edge memory forensics software.

Memory forensics is the art of analyzing RAM to solve digitalcrimes. Conventional incident response often overlooks volatilememory, which contains crucial information that can prove ordisprove the system’s involvement in a crime, and can evendestroy it completely. By implementing memory forensics techniques,analysts are able to preserve memory resident artifacts which oftenprovides a more efficient strategy for investigating modernthreats.

In The Art of Memory Forensics, the VolatilityProject’s team of experts provides functional guidance andpractical advice that helps readers to:

  • Acquire memory from suspect systems in a forensically soundmanner
  • Learn best practices for Windows, Linux, and Mac memoryforensics
  • Discover how volatile memory analysis improves digitalinvestigations
  • Delineate the proper investigative steps for detecting stealthmalware and advanced threats
  • Use free, open source tools to conduct thorough memoryforensics investigations
  • Generate timelines, track user activity, find hidden artifacts,and more

The companion website provides exercises for each chapter, plusdata that can be used to test the various memory analysistechniques in the book. Visit our website atwww.wiley.com/go/memoryforensics.

Product Details
Recommended for You
Customer Reviews
 
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $65.00
Formats:  ePub, Mobi, PDF