When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network.
This textbook, based on the authors popular training course, covers memory acquisition, rootkits, tracking user activity, and more, plus case studies that illustrate the real-world application of the techniques presented. With a focus on the latest technological innovations in digital forensics, this book is essential for bridging the gap in the next era of malware and security breaches. The authors provide detailed information on how to use free, open source tools for conducting thorough memory forensics, making it a valuable resource for professionals in the fields of security, cryptography, and criminology.
When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network.