Book Content
chapters • 10h8m total length
1. Why Memory Forensics?
2. Acquisition Process
3. Windows Memory Acquisition
4. Reconstructing User Activity with Windows Memory Forensics
5. Malware Detection and Analysis with Windows Memory Forensics
6. Alternative Sources of Volatile Memory
7. Linux Memory Acquisition
8. User Activity Reconstruction
9. Malicious Activity Detection
10. MacOS Memory Acquisition
11. Malware Detection and Analysis with macOS Memory Forensics














