Written by forensic experts from the field, this book is the finest of all in exploring the art of Malware investigation in clear and concise manner. It offers in depth coverage of tools and technique used in live as well as static Malware analysis.





Here is the table of contents of this book

Chapter 1 Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Chapter 2 Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
Chapter 3 Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 4 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Chapter 5 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Chapter 6 Legal Considerations
Chapter 7 File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System
Chapter 8 File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
Chapter 9 Analysis of a Suspect Program: Windows
Chapter 10 Analysis of a Suspect Program: Linux

This book does extensive and accurate technical coverage of malware investigation on both Windows as well as Linux platform.  It starts with investigation of malware infected system to gather all evidences and then explains about analyzing them in detail to get to the root of malware. It also throws light on discovering the Malware traces through live process memory and physical file analysis to gather all possible information about Malware actions.

The book’s companion website www.malwareforensics.com is a great resource as it offers latest news from the malware forensics field including updates about new Windows/Linux tools related to malware investigation. You can download the sample chapter here. This link also contains the promotional code which will get you 20% discount on purchase of this book.

Though the book is over priced,  it is well worth the money for those who are serious about taking their career into top of Malware investigation.

.