Practical Linux Malware ForensicWhen a security officer or an investigator conducts a forensic task today, the ability to analyze malicious code such as worms, botnets, rootkits, and Trojan horses in Windows, including Linux, and windows and other logs, need. This book, written by information security experts who have been involved in real-life investigations for many years, includes tools and checklists, various case histories, and expert tips for analyzing infiltrations in the Linux operating system.