III Linux Memory Forensics
- Chapter 19: Linux Memory Acquisition
- Chapter 20: Linux Operating System
- Chapter 21: Processes and Process Memory
- Chapter 22: Networking Artifacts
- Chapter 23: Kernel Memory Artifacts
- Chapter 24: File Systems in Memory
- Chapter 25: Userland Rootkits
- Chapter 26: Kernel Mode Rootkits
- Chapter 27: Case Study: Phalanx 2
Get The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.