Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Incident Response & Computer Forensics, Third Edition
Taschenbuch von Jason Luttgens (u. a.)
Sprache: Englisch

59,65 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.



The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.



The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans
Über den Autor
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime.
Inhaltsverzeichnis
Part 1 PREPARING FOR THE INEVITABLE INCIDENT
1Real World Incidents
2IR Management Handbook
3Pre-Incident Preparation

Part 2 INCIDENT DETECTION AND CHARACTERIZATION
4Getting the Investigation Started
5Initial Development of Leads
6Discovering the Scope of the Incident

Part 3 DATA COLLECTION
7Live Data Collection
8Forensic Duplication
9Network Evidence
10Enterprise Services

Part 4 DATA ANALYSIS
11Analysis Methodology
12Investigating Windows Systems
13Investigating MacOS Systems
14Investigating Applications
15Malware Triage
16Report Writing

Part 5 REMEDIATION
17Remediation Introduction
18Remediation Case Studies

Part 6 APPENDICES
App AAnswers to Questions
App BIncident Response Forms
Details
Erscheinungsjahr: 2014
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780071798686
ISBN-10: 0071798684
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Luttgens, Jason
Mandia, Kevin
Pepe, Matthew
Hersteller: McGraw-Hill Education - Europe
Maße: 231 x 189 x 32 mm
Von/Mit: Jason Luttgens (u. a.)
Erscheinungsdatum: 16.03.2014
Gewicht: 0,915 kg
Artikel-ID: 121014972
Über den Autor
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime.
Inhaltsverzeichnis
Part 1 PREPARING FOR THE INEVITABLE INCIDENT
1Real World Incidents
2IR Management Handbook
3Pre-Incident Preparation

Part 2 INCIDENT DETECTION AND CHARACTERIZATION
4Getting the Investigation Started
5Initial Development of Leads
6Discovering the Scope of the Incident

Part 3 DATA COLLECTION
7Live Data Collection
8Forensic Duplication
9Network Evidence
10Enterprise Services

Part 4 DATA ANALYSIS
11Analysis Methodology
12Investigating Windows Systems
13Investigating MacOS Systems
14Investigating Applications
15Malware Triage
16Report Writing

Part 5 REMEDIATION
17Remediation Introduction
18Remediation Case Studies

Part 6 APPENDICES
App AAnswers to Questions
App BIncident Response Forms
Details
Erscheinungsjahr: 2014
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780071798686
ISBN-10: 0071798684
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Luttgens, Jason
Mandia, Kevin
Pepe, Matthew
Hersteller: McGraw-Hill Education - Europe
Maße: 231 x 189 x 32 mm
Von/Mit: Jason Luttgens (u. a.)
Erscheinungsdatum: 16.03.2014
Gewicht: 0,915 kg
Artikel-ID: 121014972
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte