Table of Contents
- Why Memory Forensics?
- Acquisition Process
- Windows Memory Acquisition
- Reconstructing User Activity with Windows Memory Forensics
- Malware Detection and Analysis with Windows Memory Forensics
- Alternative Sources of Volatile Memory
- Linux Memory Acquisition
- User Activity Reconstruction
- Malicious Activity Detection
- MacOS Memory Acquisition
- Malware Detection and Analysis with macOS Memory Forensics

