Table of Contents:
  • Malware incident response
  • Linux memory forensics
  • Postmortem forensics
  • Legal considerations
  • File identification and profiling
  • Analysis of a malware specimen.