Skip to main content

Posts

Showing posts with the label aa

Malware Forensics: Investigating and Analyzing Malicious Code

Malware Forensics: Investigating and Analyzing Malicious Code  :-   Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine phys...

Learn how to perform an efficient, organized, and effective penetration test from start to finish

Learn how to perform an efficient, organized, and effective penetration test from start to finish. Gain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewalls Take the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutions Detailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reports Properly scope your penetration test to avoid catastrophe Understand in detail how the testing process works from start to finish, not just how to use specific tools Use advanced techniques to bypass security controls and remain hidden while testing Create a segmented virtual network with several targets, IDS and firewall Generate testing reports and statistics Perform an efficient, organized, and effective pen...