Back to Results
First PageMeta Content
Digital forensics / Computer forensics / Malware / Rootkit / Operating system / Computer memory / Core dump / Disk formatting / The Sleuth Kit / Computing / System software / Computer security


Chapter | 1 Linux Malware Incident Response 5
Add to Reading List

Document Date: 2014-02-21 16:19:04


Open Document

File Size: 339,69 KB

Share Result on Facebook

IndustryTerm

then preserve information using live response tools / applicable tool / compromised media / /

OperatingSystem

UNIX / Linux / /

Position

digital investigator / /

PublishedMedium

the Message Digest / the Malware Forensics Field Guide / /

Technology

Linux System / Command Line Interface / Linux / UNIX / operating system / /

SocialTag