Home
Extended Windows Memory Dump Analysis: Using and Writing WinDbg Extensions, Database and Event Stream Processing, Visualization
Barnes and Noble
Extended Windows Memory Dump Analysis: Using and Writing WinDbg Extensions, Database and Event Stream Processing, Visualization
Current price: $99.00
Barnes and Noble
Extended Windows Memory Dump Analysis: Using and Writing WinDbg Extensions, Database and Event Stream Processing, Visualization
Current price: $99.00
Size: OS
Loading Inventory...
*Product information may vary - to confirm product availability, pricing, shipping and return information please contact Barnes and Noble
The book contains the full transcript of Software Diagnostics Services training with 16 hands-on exercises. This training course extends pattern-oriented analysis introduced in Accelerated Windows Memory Dump Analysis, Accelerated .NET Core Memory Dump Analysis, and Advanced Windows Memory Dump Analysis with Data Structures courses with:
Surveying the current landscape of WinDbg extensions with analysis pattern mappings
Writing WinDbg extensions in C and C++
Connecting WinDbg to NoSQL databases
Connecting WinDbg to streaming and log processing platforms
Querying and visualizing WinDbg output data
Prerequisites:
Working knowledge of WinDbg. Working knowledge of C or C++ is optional (required only for some exercises). Other concepts are explained when necessary.
Audience:
Software developers, software maintenance engineers, escalation engineers, quality assurance engineers, security and vulnerability researchers, malware and memory forensics analysts who want to build memory analysis pipelines.
Surveying the current landscape of WinDbg extensions with analysis pattern mappings
Writing WinDbg extensions in C and C++
Connecting WinDbg to NoSQL databases
Connecting WinDbg to streaming and log processing platforms
Querying and visualizing WinDbg output data
Prerequisites:
Working knowledge of WinDbg. Working knowledge of C or C++ is optional (required only for some exercises). Other concepts are explained when necessary.
Audience:
Software developers, software maintenance engineers, escalation engineers, quality assurance engineers, security and vulnerability researchers, malware and memory forensics analysts who want to build memory analysis pipelines.