, ,

Incident Response & Computer Forensics, Third Edition

Specificaties
Paperback, blz. | Engels
McGraw-Hill Education | 3e druk, 2014
ISBN13: 9780071798686
Rubricering
McGraw-Hill Education 3e druk, 2014 9780071798686
Verwachte levertijd ongeveer 11 werkdagen

Samenvatting

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.Architect an infrastructure that allows for methodical investigation and remediationDevelop leads, identify indicators of compromise, and determine incident scopeCollect and preserve live dataPerform forensic duplicationAnalyze data from networks, enterprise services, and applicationsInvestigate Windows and Mac OS X systemsPerform malware triageWrite detailed incident response reportsCreate and implement comprehensive remediation plans

Specificaties

ISBN13:9780071798686
Taal:Engels
Bindwijze:paperback
Druk:3

Inhoudsopgave

Part 1 PREPARING FOR THE INEVITABLE INCIDENT<br>1Real World Incidents<br>2IR Management Handbook<br>3Pre-Incident Preparation<br><br>Part 2 INCIDENT DETECTION AND CHARACTERIZATION<br>4Getting the Investigation Started<br>5Initial Development of Leads<br>6Discovering the Scope of the Incident<br><br> Part 3 DATA COLLECTION<br>7Live Data Collection<br>8Forensic Duplication<br>9Network Evidence<br>10Enterprise Services<br><br>Part 4 DATA ANALYSIS<br>11Analysis Methodology<br>12Investigating Windows Systems<br>13Investigating MacOS Systems<br>14Investigating Applications<br>15Malware Triage<br>16Report Writing<br><br>Part 5 REMEDIATION<br>17Remediation Introduction<br>18Remediation Case Studies<br><br>Part 6 APPENDICES<br>App AAnswers to Questions<br>App BIncident Response Forms<br>

Rubrieken

    Personen

      Trefwoorden

        Incident Response & Computer Forensics, Third Edition