This Practitioner's Guide is designed to help digital investigators identify malware on a Linux computer system, collect volatile (and relevant nonvolatile) system data to further investigation, and determine the impact malware makes on a subject system, all in a reliable, repeatable, defensible, and thoroughly documented manner.Linux Command Line and Shell Scripting Bible (2nd Edition). New York: Wiley. ... UNIX and Linux System Administration Handbook (4th Edition). Upper Saddle ... Retrieved from www. dfrws.org/2010/proceedings/2010-304.pdf. Kent, K., et al.
|Title||:||Linux Malware Incident Response|
|Author||:||Cameron H. Malin|
|Publisher||:||Elsevier - 2013-01-01|