Malware Forensics:   
                             Investigating and Analyzing Malicious Code
Home PAge


Follow us on Twitter!

Book Reviews
In addition to the reviews on, some folks have taken time out of their busy schedules' to read and review Malware Forensics--many thanks to all of you!  Some of these reviews include:
-Tony Campbell from Digital Forensics Magazine;
-Greg Steen from Microsoft Technet Magazine;
-Nagareshwar Talekar from SecurityXploded; and
-Jeff Berg from USENIX.

Malware Forensics translated into Korean
The official Korean translation of Malware Forensics is distributed by Acorn Publishing.

Malware Forensics
named "Best Book Bejtlich Read 2008"

Richard Bejtlich, Director of Incident Response for General Electric, accomplished network security/forensics author, top-ranked information security book review for, and author of the popular Taosecurity blog recently named Malware Forensics as the "Best Book Bejtlich Read 2008."  The authors of Malware Forensics are honored and humbled by this distinction.
Malware Forensics: Investigating and Analyzing Malicious Code, published by Syngress/Elsevier, covers the emerging field of live digital forensics, where investigators examine computers and networks systems to collect and preserve critical data during a live incident that may be lost if the system is shut down or immediately remediated.  The book’s content focuses on identifying and capturing malicious code and relevant evidence of its effect on the compromised system by using live forensics and evidence collection methodologies applicable to Windows and Linux operating systems. The book also provides clear and concise guidance on how to forensically capture and examine physical and process computer memory as a key investigative step in malicious code forensics. Further,  Malware Forensics provides deep coverage on "file profiling," or the preliminary analysis of suspect file, as well as dynamic and static analysis of a malware specimen. Finally, the book covers the legal ramifications of malware attacks to guide companies on how best to coordinate efforts across IT, legal, finance, marketing and other business units to achieve the most effective response for affected stakeholders. 

[Free sample chapter download]