Customers who viewed this item also viewed
Buy new:
-43% $39.23$39.23
FREE delivery Friday, November 7
Ships from: Amazon Sold by: Apex_media
Save with Used - Good
$30.23$30.23
FREE delivery Friday, November 7 on orders shipped by Amazon over $35
Ships from: Amazon Sold by: Opti Sales
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory 1st Edition
Purchase options and add-ons
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics―now the most sought after skill in the digital forensics and incident response fields.
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:
- How volatile memory analysis improves digital investigations
- Proper investigative steps for detecting stealth malware and advanced threats
- How to use free, open source tools for conducting thorough memory forensics
- Ways to acquire memory from suspect systems in a forensically sound manner
The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.
- ISBN-101118825098
- ISBN-13978-1118825099
- Edition1st
- PublisherWiley
- Publication dateJuly 28, 2014
- LanguageEnglish
- Dimensions7.3 x 1.75 x 9.25 inches
- Print length912 pages
Frequently bought together

Customers who viewed this item also viewed
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious SoftwarePaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Windows Internals: System architecture, processes, threads, memory management, and more, Part 1 (Developer Reference)PaperbackFREE ShippingOnly 1 left in stock - order soon.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and ObfuscationPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Hacking: The Art of Exploitation, 2nd EditionPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced ThreatsPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Customers also bought or read
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$43.88$43.88FREE delivery Friday - Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Paperback$31.64$31.64Delivery Friday - Windows Internals: System architecture, processes, threads, memory management, and more, Part 1 (Developer Reference)
Paperback$56.89$56.89FREE delivery Mon, Nov 10 - Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Paperback$42.42$42.42FREE delivery Friday - Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Paperback$47.97$47.97FREE delivery Friday - Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Paperback$52.46$52.46FREE delivery Friday - Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
Paperback$33.99$33.99Delivery Friday - Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Paperback$37.98$37.98FREE delivery Fri, Nov 14 - The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Paperback$30.99$30.99Delivery Friday - Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Paperback$40.60$40.60$3.99 delivery Thu, Nov 20 - Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Paperback$43.01$43.01FREE delivery Friday - The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Paperback$35.04$35.04$3.99 delivery Tue, Nov 18 - Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition
Paperback$28.83$28.83Delivery Friday - The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Paperback$8.99$8.99Delivery Friday - Black Hat Bash: Creative Scripting for Hackers and Pentesters
Paperback$44.08$44.08FREE delivery Fri, Nov 28 - OSINT Techniques: Resources for Uncovering Online Information
Paperback$42.24$42.24FREE delivery Friday - Network Basics for Hackers: How Networks Work and How They Break
Paperback$36.84$36.84FREE delivery Friday - The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler
Paperback$65.60$65.60FREE delivery Fri, Dec 12 - Practical Linux Forensics: A Guide for Digital Investigators
Paperback$40.27$40.27$3.99 delivery Thu, Nov 20 - Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset
Paperback$59.99$59.99FREE delivery Friday - Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
Paperback$38.00$38.00FREE delivery Friday
Editorial Reviews
From the Inside Flap
SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OF DIGITAL ATTACKS
The Art of Memory Forensics, a follow-up to the bestselling Malware Analyst’s Cookbook, is a practical guide to the rapidly emerging investigative technique for digital forensics, incident response, and law enforcement. Memory forensics has become a must-have skill for combating the next era of advanced malware, targeted attacks, security breaches, and online crime. As breaches and attacks become more sophisticated, analyzing volatile memory becomes ever more critical to the investigative process. This book provides a comprehensive guide to performing memory forensics for Windows, Linux, and Mac systems, including x64 architectures. Based on the authors’ popular training course, coverage includes memory acquisition, rootkits, tracking user activity, and more, plus case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises, sample memory dumps, and cutting-edge memory forensics software.
Memory forensics is the art of analyzing RAM to solve digital crimes. Conventional incident response often overlooks volatile memory, which contains crucial information that can prove or disprove the system’s involvement in a crime, and can even destroy it completely. By implementing memory forensics techniques, analysts are able to preserve memory resident artifacts which often provides a more efficient strategy for investigating modern threats.
In The Art of Memory Forensics, the Volatility Project’s team of experts provides functional guidance and practical advice that helps readers to:
- Acquire memory from suspect systems in a forensically sound manner
- Learn best practices for Windows, Linux, and Mac memory forensics
- Discover how volatile memory analysis improves digital investigations
- Delineate the proper investigative steps for detecting stealth malware and advanced threats
- Use free, open source tools to conduct thorough memory forensics investigations
- Generate timelines, track user activity, find hidden artifacts, and more
The companion website provides exercises for each chapter, plus data that can be used to test the various memory analysis techniques in the book. Visit our website at www.wiley.com/go/memoryforensics.
From the Back Cover
SOPHISTICATED DISCOVERY AND ANALYSIS FOR THE NEXT WAVE OF DIGITAL ATTACKS
The Art of Memory Forensics, a follow-up to the bestselling Malware Analyst’s Cookbook, is a practical guide to the rapidly emerging investigative technique for digital forensics, incident response, and law enforcement. Memory forensics has become a must-have skill for combating the next era of advanced malware, targeted attacks, security breaches, and online crime. As breaches and attacks become more sophisticated, analyzing volatile memory becomes ever more critical to the investigative process. This book provides a comprehensive guide to performing memory forensics for Windows, Linux, and Mac systems, including x64 architectures. Based on the authors’ popular training course, coverage includes memory acquisition, rootkits, tracking user activity, and more, plus case studies that illustrate the real-world application of the techniques presented. Bonus materials include industry-applicable exercises, sample memory dumps, and cutting-edge memory forensics software.
Memory forensics is the art of analyzing RAM to solve digital crimes. Conventional incident response often overlooks volatile memory, which contains crucial information that can prove or disprove the system’s involvement in a crime, and can even destroy it completely. By implementing memory forensics techniques, analysts are able to preserve memory resident artifacts which often provides a more efficient strategy for investigating modern threats.
In The Art of Memory Forensics, the Volatility Project’s team of experts provides functional guidance and practical advice that helps readers to:
- Acquire memory from suspect systems in a forensically sound manner
- Learn best practices for Windows, Linux, and Mac memory forensics
- Discover how volatile memory analysis improves digital investigations
- Delineate the proper investigative steps for detecting stealth malware and advanced threats
- Use free, open source tools to conduct thorough memory forensics investigations
- Generate timelines, track user activity, find hidden artifacts, and more
The companion website provides exercises for each chapter, plus data that can be used to test the various memory analysis techniques in the book. Visit our website at www.wiley.com/go/memoryforensics.
About the Author
Andrew Case is a Digital Forensics Researcher specializing in memory, disk, and network forensics.
Jamie Levy is a Senior Researcher and Developer, targeting memory, network, and malware forensics analysis.
AAron Walters is founder and lead developer of the Volatility Project, President of the Volatility Foundation, and Chair of Open Memory Forensics Workshop.
Product details
- Publisher : Wiley
- Publication date : July 28, 2014
- Edition : 1st
- Language : English
- Print length : 912 pages
- ISBN-10 : 1118825098
- ISBN-13 : 978-1118825099
- Item Weight : 3.35 pounds
- Dimensions : 7.3 x 1.75 x 9.25 inches
- Best Sellers Rank: #185,942 in Books (See Top 100 in Books)
- #27 in Computer Viruses
- #39 in Web Encryption
- #116 in Computer Network Security
- Customer Reviews:
About the authors

Discover more of the author’s books, see similar authors, read book recommendations and more.

Jamie Levy is a senior researcher and developer with the Volatility Foundation. She worked on various R&D projects and forensic cases while previously working at Guidance Software, Inc. Jamie has taught classes in Computer Forensics and Computer Science at Queens College (CUNY) and John Jay College (CUNY). She has an MS in Forensic Computing from John Jay College and is an avid contributor to the open source Computer Forensics community. She is an active developer on the Volatility Framework. Jamie has authored peer-reviewed conference publications and presented at conferences (OMFW, CEIC, IEEE ICC) on the topics of memory, network, and malware forensics analysis. Websites: http://gleeda.blogspot.com.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book well-written and in-depth, with one review highlighting its fantastic job of explaining technical analysis concepts. Moreover, the book serves as a definitive guide to memory forensics, and customers appreciate its well-structured format. However, opinions on value for money are mixed, with some customers finding it well worth the price.
AI Generated from the text of customer reviews
Select to learn more
Customers find the book informative and detailed, with one customer highlighting its fantastic job of explaining technical analysis concepts.
"Delivers detailed and accurate information, practical examples, additional information available online: "The book's supplementary materials are..." Read more
"...The book is an essential reference, reasonably complete and well written...." Read more
"Good overview and seems technically correct. Very good explanation and usage of the volatility framework." Read more
"The best technical book on the subject of memory forensics to date...." Read more
Customers praise this book as a definitive guide to memory forensics, with one customer noting it is the most detailed book in the volatile memory space.
"The Art of Memory Forensics is one of the best written and edited tech books I have read...." Read more
"...best books in the digital forensics space and the most detailed book in the volatile memory space." Read more
"...is written by the Core Developers of Volatility and pioneers in the field of memory forensics...." Read more
"...Outstanding material, this book offers an in-depth, in-depth approach to memory analysis...." Read more
Customers find the book well written, with one customer noting it's a technical book by an industry leading expert, and several mentioning it helps in writing their own plugins.
"The Art of Memory Forensics is one of the best written and edited tech books I have read...." Read more
"...Thanks to one of the most well-organized, well-written, and informative I.T. books I have ever read, I was able to effectively isolate this piece of..." Read more
"...Silly me. This book is so well structured and written. Makes memory forensics fun." Read more
"...The book is an essential reference, reasonably complete and well written...." Read more
Customers appreciate the structure of the book.
"...Thanks to one of the most well-organized, well-written, and informative I.T. books I have ever read, I was able to effectively isolate this piece of..." Read more
"...The book is very well structured it covers the internals of the Operating System and then the authors explain how the structures are used by the..." Read more
"...Silly me. This book is so well structured and written. Makes memory forensics fun." Read more
Customers have mixed opinions about the book's value for money, with some finding it well worth the price.
"...Well worth the price. A must for any serious forensics analyst who wants to stand out amongst his/her peers." Read more
"...but the site, for a book this costly, needs to be completed...." Read more
"Well worth the price, value far exceeds...." Read more
Reviews with images
Buyer beware with Amazon.
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on November 14, 2014Format: PaperbackVerified PurchaseThis book is one of the best book i have read in recent years. This is a book for anyone in the field of Incident Response, Malware Analysis, Reverse Engineering and Digital Forensics. This book is written by the Core Developers of Volatility and pioneers in the field of memory forensics.The book is very well structured it covers the internals of the Operating System and then the authors explain how the structures are used by the plugins, the authors also show how these plugins can be run against the memory images with real case examples to identify forensic artifacts. In many cases the authors show how to access the operating system structures programmatically using the volshell, this can help in writing your own plugins and also the author references various external sources where you can find more information on a specific topic. The book covers many creative techniques that you can apply in the real world and it also covers information on the Anti-Forensics techniques and how to detect them by cross referencing them with different plugins/data sources. The amount of detail explained in the book shows the knowledge and amount of research the authors have done in this field and the effort the authors have put in to write this book and the Volatility plugins. In short After reading this book you will understand how the operating system works, how the Volatility works, how malware works, how memory forensics work, how to identify the malware and forensic artifacts using memory forensics, how to write your own plugin. I have never seen any book covering these many details, this is one book for everything on memory forensics. This definitely should be the Book of the Year. If there was an option of giving this book ten stars, i would give it ten stars.
- Reviewed in the United States on September 18, 2014Format: PaperbackVerified PurchaseAt this writing (Fall 2014) the Wiley instructor companion website is not up to Wiley standards (yet). I wanted to test the code for this review, but the code section on the site only defaults to the creative commons license (both the code and license links). Same with all the chapters, they only display commons, a strawman syllabus and an intro letter. They only resource that is already up is the Powerpoint presentation, and at over 100 pages it is simply OUTSTANDING, which whets the appetite even more for the rest of the outlines, solutions, code, and much more.
So, Wiley, get with it! If you are considering buying this, add your vote in comments and Wiley might listen. I'll update this once we get the code, both with quality of the code and where it can be used. Going over the license so far, it is quite generous, much like GNU with an attribution link, although of course more robust beyond teaching (eg commercial) if you do get permission. The text itself has wonderful, up to date sploit and software info, patches, etc. but the site, for a book this costly, needs to be completed. I'm not recommending you pass on this because of it, but we won't be getting the full value for our purchase, nor will our students, until the site is completed.
REVIEW UPDATE: SEE MICHAEL'S COMMENT ATTACHED TO THIS REVIEW. Although Amazon's automated system generally removes links, the comment gives complete and up to date online resources for this book, as the publisher's link is incomplete, and will not be updated. The publisher promotion of online evidence samples, code, etc. is not wrong or deceptive, it is just on github rather than the publisher's site as indicated. PLEASE VIEW THE COMMENT AND VISIT THE SITES INDICATED IN THE COMMENT BEFORE LEAVING A NEGATIVE REVIEW-- the resources ARE there, just not where advertised. Also, see Michael's other best seller at: Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code.
If you are price conscious, notice that in addition to the generous web resources in the comment (including open source/ freeware), the book is over 900 pages long, and PACKED with practical, use-it-now reference and learning tools. I've already visited the samples, and they are awesome, especially given that they cover the most frequent o/s permutations. Both Windows and Linux give the exact traces indicated, these authors are the real thing.
- Reviewed in the United States on February 23, 2015Format: PaperbackVerified PurchaseI have worked in I.T. for 15 years - in Windows system administration, database administration, and utility software development. About one month ago I started reading heavily on security, and planned for 2015 a shift in career focus to that discipline. So I bought this book and began to read. This had immediate payoff just 2 days ago when I noticed an email from our security team that an IDS had detected a possible Trojan signature on one of our servers. Another analyst ran a full AV scan, and when she found nothing, the email thread dried up. Not so convinced (I had just read the fact on Mandiant's website that "100% of victims had up-to-date AV software), I triggered a complete memory dump on the server using LiveKD and began working on it with WinDbg commands and Volatility Framework. Within the first few hours, it appeared that there certainly looked to be a rootkit-like presence, but with my limited security knowledge and, even though I debug a kernel dump every now and then, I don't usually look at things like the IDT 2e entry, etc. However, 15 hours into researching my first real-life production issue, I completely narrowed down the source and contacted the security team and account management. This server would have continued to operate under the radar with the standard tools continually missing the malware's presence and caused who knows what problems. Thanks to one of the most well-organized, well-written, and informative I.T. books I have ever read, I was able to effectively isolate this piece of malware. This book is an absolute must for anyone even employed in I.T. with responsibilities over safeguarding company networks and infrastructure, and (unfortunately) these days, should probably be employed by anyone at all that plugs in an Ethernet cable or attaches to Wi-Fi! Outstanding material - thanks very much.
Top reviews from other countries
Derek ArmstrongReviewed in Canada on July 30, 20175.0 out of 5 stars If you do any kind of forensics, you need ...
Format: PaperbackVerified PurchaseIf you do any kind of forensics, you need memory forensics. And this book is the current bible for it. I have learned more from this book than any other in digital security.
jubalgunnReviewed in the United Kingdom on November 14, 20155.0 out of 5 stars Essential for those conducting memory analysis.
Format: PaperbackVerified PurchaseThe Art of Memory Forensics is like the equivalent of the bible in Memory Forensic terms. It is a must have and a must have if you are actively involved in computer forensic investigations whether this be in the private or public sector. Do not be intimidated by the size of the book it is very well laid out , easy t understand and contains a treasure trove of information concerning the examination of memory. The main tool used is Volatility which this book explains in detail how to use and leverage in investigations to get the most evidence.
-
christianReviewed in Italy on January 21, 20215.0 out of 5 stars Ottimo punto di riferimento
Format: PaperbackVerified PurchaseIl libro si presenta bene molto dettagliato nei vari processi e spiegazioni molto tecnico
-
Eliana N. ValeReviewed in Brazil on May 4, 20215.0 out of 5 stars Livro foi comprado para presente
Format: PaperbackVerified PurchaseParece ser muito bom; foi indicado por um especialista na área
-
LucasReviewed in France on August 30, 20215.0 out of 5 stars Très bon livre
Format: PaperbackVerified PurchaseUn très bon livre, mais pour bien l’apprécier, il faudra malgré tout avoir une bonne base technique



















