- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The all-new edition of the market's 1 selling incident response book reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios.
Andere Kunden interessierten sich auch für
- Michael Whitman ( Institute for Cybersecurity Workforce DevelopmentPrinciples of Incident Response & Disaster Recovery108,99 €
- Oleg SkulkinIncident Response Techniques for Ransomware Attacks53,99 €
- Deepanshu KhannaDigital Forensics and Incident Response45,99 €
- Rebekah BrownIntelligence-Driven Incident Response58,99 €
- Computer Security Incident Response Planning at Nuclear Facilities36,99 €
- N.K. McCarthyThe Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk69,99 €
- Chuck EasttomDigital Forensics, Investigation, and Response80,99 €
-
-
-
The all-new edition of the market's 1 selling incident response book reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Professional
- 3rd ed.
- Seitenzahl: 624
- Erscheinungstermin: 16. März 2014
- Englisch
- Abmessung: 231mm x 189mm x 32mm
- Gewicht: 917g
- ISBN-13: 9780071798686
- ISBN-10: 0071798684
- Artikelnr.: 37040319
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: McGraw-Hill Professional
- 3rd ed.
- Seitenzahl: 624
- Erscheinungstermin: 16. März 2014
- Englisch
- Abmessung: 231mm x 189mm x 32mm
- Gewicht: 917g
- ISBN-13: 9780071798686
- ISBN-10: 0071798684
- Artikelnr.: 37040319
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime.
Part I: Overview
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Part I: Overview
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery
Ch. 1: Case Study
Ch. 2: The Incident Response Process
Ch. 3: Preparing for Incident Response Part II: Data Collection
Ch. 4: Data Collection From Windows
Ch. 5: Data Collection from Unix
Ch. 6: Forensic Duplication
Ch. 7: Network Traffic Collection
Ch. 8: Data Collection from Other Sources
Ch. 9: Evidence Handling Part III: Forensic Analysis
Ch. 10: Physical Analysis
Ch. 11: Data Analysis
Ch. 12: Analysis of Windows Systems
Ch. 13: Unix Part IV: Analysis of Other Evidence
Ch. 14: Investigation of Routers
Ch. 15: Investigation of Web Servers
Ch. 16:Investigation of Application Servers
Ch. 17: Analysis of Network Traces
Ch. 18: Investigating Hacker Tools Part V: Remediation
Ch. 19: Reporting and Documentation
Ch. 20: Developing an Incident Response Plan
Ch. 21: Establishing Identify in Cyberspace
Ch. 22: Data Recovery