A practical guide to deploying digital forensic techniques in response to cyber security incidents Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan…mehr
A practical guide to deploying digital forensic techniques in response to cyber security incidents Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom. By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization. What you will learn Create and deploy incident response capabilities within your organization Build a solid foundation for acquiring and handling suitable evidence for later analysis Analyze collected evidence and determine the root cause of a security incident Learn to integrate digital forensic techniques and procedures into the overall incident response process Integrate threat intelligence in digital evidence analysis Prepare written documentation for use internally or with external parties such as regulators or law enforcement agencies Who this book is for This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. It will also help professionals who are new to the incident response/digital forensics role within their organization.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Gerard Johansen is an incident response professional with over 15 years' experience in areas like penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his information security career as a cyber crime investigator, he has built on that experience while working as a consultant and security analyst for clients and organizations ranging from healthcare to finance. Gerard is a graduate of Norwich University's Master of Science in Information Assurance program and a certified information systems security professional. He is currently employed as a senior incident response consultant with a large technology company, focusing on incident detection, response, and threat intelligence integration.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826
Wir verwenden Cookies und ähnliche Techniken, um unsere Website für Sie optimal zu gestalten und Ihr Nutzererlebnis fortlaufend zu verbessern. Ihre Einwilligung durch Klicken auf „Alle Cookies akzeptieren“ können Sie jederzeit widerrufen oder anpassen. Bei „Nur notwendige Cookies“ werden die eingesetzten Techniken, mit Ausnahme derer, die für den Betrieb der Seite unerlässlich sind, nicht aktiviert. Um mehr zu erfahren, lesen Sie bitte unsere Datenschutzerklärung.
Notwendige Cookies ermöglichen die Grundfunktionen einer Website (z. B. Seitennavigation). Sie können nicht deaktiviert werden, da eine technische Notwendigkeit besteht.
Funktionale Cookies sorgen für ein komfortables Nutzererlebnis und speichern z. B. ob Sie eingeloggt bleiben möchten. Diese Arten von Cookies dienen der „Wiedererkennung“, wenn Sie unsere Website besuchen.
Wir nutzen Marketing Cookies, um die Relevanz unserer Seiten und der darauf gezeigten Werbung für Sie zu erhöhen und auf Ihre Interessen abzustimmen. Zu diesem Zweck teilen wir die Daten auch mit Drittanbietern.