Malware forensics investigating and analyzing malicious code
| Main Authors: | Aquilina, James M. (Author), Casey, Eoghan (Author), Malin, Cameron H. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Burlington
Syngress Publishing
c2008
|
| Subjects: |
Similar Items
Malware Analyst's cookbook and dvd tools and techniques for fighting malicious code
by: Ligh, Michael W., et al.
Published: (2011)
by: Ligh, Michael W., et al.
Published: (2011)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives
by: Laykin, Erik
Published: (2013)
by: Laykin, Erik
Published: (2013)
Computer forensics jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-, et al.
Published: (2011)
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Digital forensics for handheld devices
by: Doherty, Eamon P.
Published: (2013)
by: Doherty, Eamon P.
Published: (2013)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2015)
by: Sammons, John
Published: (2015)
Hacking exposed malware & rootkits malware & rootkits security secrets & solutions
by: Davis, M. A. (Michael A.), et al.
Published: (2010)
by: Davis, M. A. (Michael A.), et al.
Published: (2010)
Unix and Linux forensic analysis DVD toolkit
by: Pogue, Chris, et al.
Published: (2008)
by: Pogue, Chris, et al.
Published: (2008)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
Computer forensies : jumpstart
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
by: Solomon, Michael [ (Michael G.)] , 1963-
Published: (2011)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
The computer virus crisis
by: Fites, Philip E., et al.
Published: (1992)
by: Fites, Philip E., et al.
Published: (1992)
The computer virus protection handbook
by: Haynes, Colin
Published: (1990)
by: Haynes, Colin
Published: (1990)
Rogue programs virusus, worms, and Trojan horses
by: Hoffman, Lance J.
Published: (1990)
by: Hoffman, Lance J.
Published: (1990)
The computer virus handbook
by: Levin, Richard B.
Published: (1990)
by: Levin, Richard B.
Published: (1990)
A short course on computer viruses
by: Cohen, Frederick B. 1956-
Published: (1994)
by: Cohen, Frederick B. 1956-
Published: (1994)
Computer viruses
by: Summers, Wayne, et al.
Published: (1993)
by: Summers, Wayne, et al.
Published: (1993)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
Computer forensics cybercriminals, laws, and evidence
by: Maras, Marie-Helen 1979-
Published: (2014)
by: Maras, Marie-Helen 1979-
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
The new forensics investigating corporate fraud and the theft of intellectual property
by: Anastasi, Joe 1953-
Published: (2003)
by: Anastasi, Joe 1953-
Published: (2003)
Secure and resilient software development
by: Merkow, Mark S., et al.
Published: (2010)
by: Merkow, Mark S., et al.
Published: (2010)
Spyware and adware
by: Aycock, John
Published: (2011)
by: Aycock, John
Published: (2011)
Secure software design
by: Richardson, Theodor, et al.
Published: (2013)
by: Richardson, Theodor, et al.
Published: (2013)
Microsoft Internet Security and Acceleration (ISA) Server 2000
by: Ballard, Jason 1974-, et al.
Published: (2003)
by: Ballard, Jason 1974-, et al.
Published: (2003)
Trust and security in collaborative computing
by: Zou, Xukai 1963-, et al.
Published: (2008)
by: Zou, Xukai 1963-, et al.
Published: (2008)
Hunting security bugs
by: Gallagher, Tom, et al.
Published: (2006)
by: Gallagher, Tom, et al.
Published: (2006)
Fuzzing for software security testing and quality assurance
by: Takanen, Ari, et al.
Published: (2008)
by: Takanen, Ari, et al.
Published: (2008)
Computer viruses and data protection
Published: (1991)
Published: (1991)
Secure and resilient software requirements, test cases, and testing methods
by: Merkow, Mark S., et al.
Published: (2012)
by: Merkow, Mark S., et al.
Published: (2012)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Similar Items
-
Malware Analyst's cookbook and dvd tools and techniques for fighting malicious code
by: Ligh, Michael W., et al.
Published: (2011) -
Guide to computer forensics and investigations
by: Nelson, Bill, et al. -
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010) -
Guide to computer forensics and investigations
Published: (2008) -
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)