Your rating(Clear)Rate this item


There was a problem filtering reviews right now. Please try again later.

3 of 4 people found the following review helpful
on September 4, 2012
This is a must have forensics guide. It contains a lot of useful tips and checklists. But it is not only a big checklist, it will guide you and states clearly what steps you need to follow and it is understandable why you need to do it. Also contains a lot of examples of how you can use a whole list of programs (free or commercial).
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 3 people found the following review helpful
on July 27, 2012
Whether you are new to the field or an experienced practitioner, this field guide will provide you with the latest tools and procedures. The forms in the field guide are excellent and provide a solid baseline for documenting incidents from start to finish. I used the guide the first week I received it, and it proved its worth within days, pointing me to a new tool that assisted me in the analysis of an infected system. The pitfalls and the analysis of the tools were the most useful to me. The authors basically did what I did not have time to do, they gathered all of the tools and best practices and stuffed them into this book. Cheers to the authors for putting together such a comprehensive and useful guide.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
4 of 6 people found the following review helpful
on November 11, 2012
A great follow-on to Malin's previous works. When you are trying to troubleshoot in a crisis,the last thing you want to do is fumble across multiple reference guides. This one volume knocks it out of the park. It is easy to follow with excellent diagrams. This is exactly what you need when time is of the essence. The author is building a great system for forensic response. I highly recommend!
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 2 people found the following review helpful
on July 16, 2012
This is an amazing resource for the computer crime investigator. Kudos to Supervisory Special Agent Malin and his team. The Field Guide is chock full of the kind of stuff you need as an investigator, like field interview questions, some go-by forms, and checklists full of reminders. This guidebook is in outline format, but there is plenty of substance. Chapters include Malware Incident Response, Memory Forensics, Post-Mortem Forensics, Legal Considerations, File Identification and Profiling, and Analysis of a Malware Specimen. There are also tool boxes (including reviews of other software products to use in certain situations), pitfalls to avoid sections including legal guidelines and tips, and supplement readings. There is even a website with updates. There is just a ton of info crammed into this book in a concise but still practical format.

This Field Guide is like having the resources of a FBI cyber squad team and technically proficient AUSAs at your fingertips. It is EXACTLY the stuff I need for field work (and exactly the stuff I don't want to improvise on the fly). I have the Windows version, but after seeing the quality of this product, I'm going to buy the Linux Field Guide and the Malware Forensics textbook also. This tool is invaluable for malware incidents but also quite useful for other cyber-crime investigations since many of the tips, legal concepts, and checklists are applicable to other cyber-crime incidents, also.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 5 people found the following review helpful
on September 28, 2012
If you're looking for a concise set of instructions to take your malware fighting skills to the next level, then this is for you. After I read this Field Guide, I made it required reading for any of my techs in the field who deal with Virus issues.

This Malware Forensics guide serves as an excellent introduction to proper forensics investigation on Windows systems. It also shores up any existing Virus/Trojan or other malware skills one may have by providing specific tools and resources to handle any issue that may arise. Of particular note are the details on maintaining a forensic grade trail of evidence that can be admissible in court. I have always been afraid of dealing with any type of evidence chain, but this book has alleviated that fear. It covers the specifics of investigating the malware as it resides on the system and includes detailed checklists for your work in the field.

Excellent work by authors Malin, Casey and Aquilina. Kudos!
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 2 people found the following review helpful
on December 11, 2013
Malware Forensics Field Guide for Windows Systems Review
Have you ever been a victim of malware? No? Then you are one lucky person! Everybody I personally know and many that I’ve never met or even heard of have encountered malware at one time of another. Malware is a real pain in the butt to get rid of and truth be told, we shouldn’t have to even worry about it. But that ain’t gonna happen any time soon considering the fact that people who create malware are, in my opinion, just plain uncaring idiots! However there is one good thing about malware, it gives forensics people a chance to study the code and beat the malware coders at their own game.
If you want to know about malware this is the book for you. It even covers the legal aspects of malware, and even covers what the forensics team may do and how. It’s not an in depth book on the legal aspect, but it does cover a few useful things. In fact, I find the whole book useful and it will be a proud addition to rest of the books in my library. I actually have two libraries, one is for pleasure reading, and the other one is for all computer related genres, such as this book. I definitely recommend this book to others.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 2 people found the following review helpful
on September 5, 2012
This Field Guide thoroughly covers all the major aspects of malware detection, analysis, and investigation.

- Covers incident response techniques, tools, procedures, and potential pitfalls
- Details volatile and non-volatile memory/storage archival and analysis techniques and tools
- Thoroughly details malware file/specimen characterization and analysis
- Provides detailed information about the myriad of tools available to the malware investigator along with usage examples and screen-shots
- Integrates critical legal/evidential laws, guidelines, and restrictions, even providing legal references by jurisdiction.

This book, while very technical, is still fairly easy to read/understand and leads you through various malware investigative processes and approaches in a way that will ensure that you are covering all your bases. This is a must have for the malware investigator! Kudos to the authors for the hard work, thought, and organization put into this work.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
on March 4, 2014
Already read chapter one, and started using Helix 3, on my systems. So, much to sink in, so take your time reading this book.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 4 people found the following review helpful
on August 25, 2012
Spying is the world's second oldest profession and malware opens the field to anyone with Internet access, making potential victims of us all. Even those without computers, tablets, or smart phones may have their financial, medical, or other personal information exploited through malware attacks on banks, corporations, and other institutions. Moreover, malware presents an asymmetric threat: a single piece of malicious code can spread across the digital landscape infecting virtually any Internet-connected device, including computers, industrial control systems, and military hardware. From theft of corporate secrets, to credit card fraud, to multi-million dollar drones mysteriously landing in the wrong country, malware inflicted damage seems a daily news item.

While governments and much of the world predictably focus on the lessons of past wars, Malin, Casey and Aquilina provide a tactical field manual based on extensive, current front line experience identifying, investigating, and analyzing computer intrusions and malware. Written primarily as a treatise for forensic professionals, Malware Forensics Field Guide for Windows Systems also is a useful resource for all IT professionals and could benefit anyone with a vested interest in digital information security. For example, although nothing in the book is intended to serve as legal advice, Chapter 4 "Legal Considerations" would be helpful to anyone asked to approve or fund an investigation involving the collection of digital evidence. Similarly, the section on "Malware Taxonomy and Phylogeny" could be useful to anyone interested in identifying the genealogy of a malware specimen.

Computer intrusions and malware are inevitable. If you are a forensic professional responding to computer intrusions and malware infections, you likely will find this guide indispensible. If you are a manager or executive anywhere in the chain of approval for your organization's cyber response capability, you will probably find the book useful to demystifying the subject and making informed decisions.
11 commentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
2 of 4 people found the following review helpful
on September 13, 2012
I found this book to be an easy read and extremely helpful. The authors did a great job by simplifying Malware Forensics for the field investigator. How can you go wrong with a resource guide that gives you interview questions, field notes, a tool box and pitfalls to avoid aka lessons learned? You couldn't ask for anything better.

I also have to mention the book's website: [...] where you can request a copy of the Field Notes and use the hyperlinks to download incident response tool suites.

Kudos to Malin, Casey and Aquilina on a job well done.
0CommentWas this review helpful to you?YesNoSending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
     
 
Customers who viewed this also viewed


 
     

Send us feedback

How can we make Amazon Customer Reviews better for you?
Let us know here.