II Windows Memory Forensics

  • Chapter 5: Windows Objects and Pool Allocations
  • Chapter 6: Processes, Handles, and Tokens
  • Chapter 7: Process Memory Internals
  • Chapter 8: Hunting Malware in Process Memory
  • Chapter 9: Event Logs
  • Chapter 10: Registry in Memory
  • Chapter 11: Networking
  • Chapter 12: Services
  • Chapter 13: Kernel Forensics and Rootkits
  • Chapter 14: Windows GUI Subsystem, Part I
  • Chapter 15: Windows GUI Subsystem, Part II
  • Chapter 16: Disk Artifacts in Memory
  • Chapter 17: Event Reconstruction
  • Chapter 18: Timelining

Get The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.