-
3
-
-
85013712215
-
-
Mandiant http://www.mandiant.com/education/incidentresponse.htm
-
-
-
-
4
-
-
85013714907
-
-
http://www.agilerm.net/publications_4.html
-
-
-
-
5
-
-
85013701712
-
-
http://msdn.microsoft.com/en-us/library/ms817948.aspx
-
-
-
-
6
-
-
85013718273
-
-
http://technet.microsoft.com/en-us/library/bb490864.aspx.
-
-
-
-
7
-
-
85013708288
-
-
http://www.diamondcs.com.au/consoletools.php
-
-
-
-
8
-
-
85013705653
-
-
http://msdn.microsoft.com/en-us/library/ms685141.aspx
-
-
-
-
9
-
-
85013737135
-
-
http://www.microsoft.com/downloads/details.aspx?FamilyID=E089CA41-6A87-40C8-BF69-28AC08570B7E&displaylang=en
-
-
-
-
10
-
-
85013703887
-
-
http://www.trapkit.de/papers/index.html
-
-
-
-
11
-
-
85013716815
-
Process Dump Analyses: Forensical acquisition and analyses of volatile data
-
Klein, "Process Dump Analyses: Forensical acquisition and analyses of volatile data, " 2006.
-
(2006)
-
-
-
12
-
-
33746021344
-
Real Digital Forensics: Computer Security and Incident Response
-
Addison Wesley
-
Keith J. Jones, Richard Bejtlich & Curtis W. Rose, Real Digital Forensics: Computer Security and Incident Response, (Addison Wesley, 2005)
-
(2005)
-
-
Jones, K.J.1
Bejtlich, R.2
Rose, C.W.3
-
13
-
-
10644222357
-
Incident Response & Computer Forensics
-
McGraw-Hill/Osborne, Second Edition
-
Kevin Mandia, Chris Prosise & Matt Pepe, Incident Response & Computer Forensics (McGraw-Hill/Osborne, Second Edition, 2003)
-
(2003)
-
-
Mandia, K.1
Prosise, C.2
Pepe, M.3
-
14
-
-
84942848239
-
-
Malware: Fighting Malicious Code, (Prentice Hall, 2003).
-
Ed Skoudis & Lenny Zeltser, Malware: Fighting Malicious Code, (Prentice Hall, 2003).
-
-
-
Skoudis, E.D.1
Zeltser, L.2
-
15
-
-
85013703856
-
-
http://msdn.microsoft.com/en-us/library/ms791453.aspx
-
-
-
-
16
-
-
85013719235
-
-
https://www.blackhat.com/presentations/bh-usa-7/Harbour/Presentation/bh-usa-07-harbour.pdf
-
-
-
-
17
-
-
85013695475
-
-
http://www.sophos.com/security/analyses/viruses-and-spyware/w32agobotcr.html
-
-
-
-
18
-
-
85013727861
-
-
http://www.diamondcs.com.au/freeutilities/md5.php
-
-
-
-
19
-
-
85013691410
-
-
http://www.toast442.org/md5/
-
-
-
-
20
-
-
85013703711
-
-
http://www.blisstonia.com/software/WinMD5/
-
-
-
-
21
-
-
85013709033
-
-
http://downloads.zdnet.com/abstract.aspx?docid=257281
-
-
-
-
22
-
-
85013709383
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
23
-
-
85013708222
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
24
-
-
85013737081
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
25
-
-
85013701461
-
-
http://mark0.net/soft-minidumper-e.html
-
-
-
-
26
-
-
85013712757
-
-
http://www.x-ways.net/winhex/
-
-
-
-
27
-
-
85013715124
-
-
http://www.f-secure.com/v-descs/haxdoor.shtml
-
-
-
-
28
-
-
85032521816
-
-
SANS Reverse-Engineering Malware Tools and Techniques Hands-on
-
Lenny Zeltser, SANS Reverse-Engineering Malware Tools and Techniques Hands-on, 2005.
-
(2005)
-
-
Zeltser, L.1
-
29
-
-
85032560611
-
-
SANS Reverse-Engineering Malware Tools and Techniques Hands-on
-
Lenny Zeltser, SANS Reverse-Engineering Malware Tools and Techniques Hands-on, 2005.
-
(2005)
-
-
Zeltser, L.1
-
30
-
-
85032545987
-
-
Mandiant Red Curtain User Guide
-
Mandiant Red Curtain User Guide
-
-
-
-
31
-
-
85032547831
-
-
Mandiant Red Curtain User Guide
-
Mandiant Red Curtain User Guide
-
-
-
-
34
-
-
84942943096
-
-
Malware: Fighting Malicious Code,Prentice Hall
-
Ed Skoudis & Lenny Zeltser, Malware: Fighting Malicious Code, (Prentice Hall, 2003)."
-
(2003)
-
-
Skoudis, E.D.1
Zeltser, L.2
-
35
-
-
85013721318
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
36
-
-
85013725984
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
37
-
-
85013722455
-
-
http://www.dfrws.org/2006/proceedings/12-Kornblum.pdf
-
-
-
-
38
-
-
85013703874
-
-
http://www.trilithium.com/johan/2005/08/linux-gate/.
-
-
-
-
39
-
-
85013688421
-
-
http://seclists.org/fulldisclosure/2004/Nov/0329.htmlhttps://itso.iu.edu/bulletins/ITSO.2005.06.28.solaris-ldso;www.cag.csail.mit.edu/rio/security-usenix.pdf
-
-
-
-
40
-
-
85013697410
-
-
http://gnunet.org/libextractor/
-
-
-
-
41
-
-
85013733255
-
-
http://gnunet.org/libextractor/documentation.php?xlang=English
-
-
-
-
42
-
-
85013702911
-
-
http://gnunet.org/libextractor/documentation.php?xlang=English
-
-
-
-
43
-
-
85013703702
-
-
http://gnunet.org/libextractor/documentation.php?xlang=English
-
-
-
-
44
-
-
84942845975
-
-
Burneye Readme File, version 1.0
-
Burneye Readme File, version 1.0
-
-
-
-
45
-
-
84942862906
-
-
Burneye Readme File, version 1.0
-
Burneye Readme File, version 1.0
-
-
-
-
46
-
-
85013725054
-
-
http://www.bellevuelinux.org/user_space.html
-
-
-
-
47
-
-
85013692433
-
-
http://www.bellevuelinux.org/kernel_space.html
-
-
-
-
48
-
-
85013701246
-
-
http://ngrep.sourceforge.net/
-
-
-
-
49
-
-
85013723071
-
-
http://nmap.org/
-
-
-
-
50
-
-
85013687057
-
-
http://www.nessus.org/nessus/
-
-
-
-
51
-
-
85013730999
-
-
http://www.virusbtn.com/resources/glossary/blended_threat.xml
-
-
-
|