Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Chapter 2. Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Chapter 4. Legal Considerations
Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Windows System
Chapter 6. Analysis of a Suspect Program