Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System Chapter 2. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems Chapter 4. Legal Considerations Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Windows System Chapter 6. Analysis of a Suspect Program Appendix A: Tool Glossary
The Syngress Digital Forensic Field Guides series is a hand-held companion for any digital and computer forensic investigator and analyst. Each book is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. Growth in technology has resulted in more technology crimes, spurring the need for more computer forensics analysts and investigators. A Computer Forensics Analyst recovers data from digital media that will be used in criminal prosecution. Digital media refers to all methods of electronic data storage and transfer devices including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. Many forensics analysts work across a variety of platforms for different jobs.