- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The all-new edition of the market's 1 selling incident response book reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios.
Andere Kunden interessierten sich auch für
- Rebekah BrownIntelligence-Driven Incident Response56,99 €
- Herbert Mattord (Kennesaw Sta Michael J. Coles College of BusinessPrinciples of Incident Response & Disaster Recovery108,99 €
- Oleg SkulkinIncident Response Techniques for Ransomware Attacks50,99 €
- Computer Security Incident Response Planning at Nuclear Facilities35,99 €
- N.K. McCarthyThe Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk69,99 €
- Malcolm McDonaldWeb Security for Developers18,99 €
- Michael E. WhitmanPrinciples of Incident Response and Disaster Recovery, Loose-Leaf Version153,99 €
-
-
-
The all-new edition of the market's 1 selling incident response book reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios.
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Professional
- 3rd ed.
- Seitenzahl: 624
- Erscheinungstermin: 16. März 2014
- Englisch
- Abmessung: 231mm x 189mm x 32mm
- Gewicht: 917g
- ISBN-13: 9780071798686
- ISBN-10: 0071798684
- Artikelnr.: 37040319
- Verlag: McGraw-Hill Professional
- 3rd ed.
- Seitenzahl: 624
- Erscheinungstermin: 16. März 2014
- Englisch
- Abmessung: 231mm x 189mm x 32mm
- Gewicht: 917g
- ISBN-13: 9780071798686
- ISBN-10: 0071798684
- Artikelnr.: 37040319
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime.
Part I: Overview
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Part I: Overview
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery