Jason Sachowski
Implementing Digital Forensic Readiness (eBook, ePUB)
From Reactive to Proactive Process, Second Edition
72,95 €
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
72,95 €
Als Download kaufen
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
36 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
72,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
36 °P sammeln
Jason Sachowski
Implementing Digital Forensic Readiness (eBook, ePUB)
From Reactive to Proactive Process, Second Edition
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.24MB
Andere Kunden interessierten sich auch für
- Jason SachowskiImplementing Digital Forensic Readiness (eBook, PDF)72,95 €
- Jason SachowskiDigital Forensics and Investigations (eBook, ePUB)72,95 €
- The GDPR Challenge (eBook, ePUB)81,95 €
- Jason SachowskiDigital Forensics and Investigations (eBook, PDF)72,95 €
- Lloyd's MIU Handbook of Maritime Security (eBook, ePUB)131,95 €
- Debarati HalderCyber Victimology (eBook, ePUB)38,95 €
- Alex AlexandrouCybercrime and Information Technology (eBook, ePUB)68,95 €
-
-
-
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 504
- Erscheinungstermin: 29. Mai 2019
- Englisch
- ISBN-13: 9780429805820
- Artikelnr.: 56960311
- Verlag: Taylor & Francis
- Seitenzahl: 504
- Erscheinungstermin: 29. Mai 2019
- Englisch
- ISBN-13: 9780429805820
- Artikelnr.: 56960311
Jason Sachowski has over twelve years of experience in digital forensic investigations, secure software development, and information security architecture. He currently manages a team of forensic investigators and data breach analysts for The Bank of Nova Scotia, commonly known as Scotiabank, Canada's third largest and most international bank.
Throughout his career, Jason has performed hundreds of digital forensic investigations involving Enterprise servers, network logs, smart phones, and database systems. Complimentary to his technical experiences, he has also developed and maintained processes and procedures, managed large information security budgets, and governed the negotiation of third-party contracts.
In addition to his professional career, Jason is the author of book 'Implementing Digital Forensic Readiness: From Reactive to Proactive Process'. He also serves as a contributing author and content moderator for DarkReading, is a subject matter expert for (ISC)2 professional exam development, and volunteers as an advocate for CyberBullying prevention and CyberSecurity awareness.
He holds several Information Security and Digital Forensic certifications including: Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP), Systems Security Certified Practitioner (SSCP), and EnCase Certified Examiner (EnCE).
Throughout his career, Jason has performed hundreds of digital forensic investigations involving Enterprise servers, network logs, smart phones, and database systems. Complimentary to his technical experiences, he has also developed and maintained processes and procedures, managed large information security budgets, and governed the negotiation of third-party contracts.
In addition to his professional career, Jason is the author of book 'Implementing Digital Forensic Readiness: From Reactive to Proactive Process'. He also serves as a contributing author and content moderator for DarkReading, is a subject matter expert for (ISC)2 professional exam development, and volunteers as an advocate for CyberBullying prevention and CyberSecurity awareness.
He holds several Information Security and Digital Forensic certifications including: Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP), Systems Security Certified Practitioner (SSCP), and EnCase Certified Examiner (EnCE).
I: ENABLING DIGITAL FORENSICS. Understanding Digital Forensics.
Investigative Process Methodology. Digital Evidence Management. Ethics and
Conduct. Digital Forensics as a Business. II: ENHANCING DIGITAL FORENSICS.
Understanding Digital Forensic Readiness. Defining Business Risk Scenarios.
Identify Potential Data Sources. Determine Collection Requirements.
Establishing Legal Admissibility. Establish Secure Storage and Handling.
Enabling Targeted Monitoring. Mapping Investigative Workflows. Establish
Continuing Education. Maintaining Evidence-Based Reporting. Ensuring Legal
Review. Accomplishing Digital Forensic Readiness. III: INTEGRATING DIGITAL
FORENSICS. Forensics Readiness in Cloud Environments. Forensics Readiness
with Mobile Devices. Forensics Readiness and the Internet of Things. IV:
ADDENDUMS. A: Tool and Equipment Validation Program. B: Service Catalog. C:
Cost-Benefit Analysis. D: Building a Taxonomy. E: Risk Assessment. F:
Threat Modelling. G: Data Warehousing Introduction. H: Requirements
Analysis. V: APPENDIXES. A: Investigative Process Models. B: Education and
Professional Certifications. C: Investigative Workflow. VI: TEMPLATES. 1:
Test Case. 2: Logbook. 3: Chain of Custody. 4: Investigative Final Report.
5: Service Catalog. 6: Business Case. 7: Net Present Value (NPV). 8: Threat
Risk Assessment. 9: Data Source Inventory Matrix. 10: Project Charter. 11:
Requirement Analysis Report.
Investigative Process Methodology. Digital Evidence Management. Ethics and
Conduct. Digital Forensics as a Business. II: ENHANCING DIGITAL FORENSICS.
Understanding Digital Forensic Readiness. Defining Business Risk Scenarios.
Identify Potential Data Sources. Determine Collection Requirements.
Establishing Legal Admissibility. Establish Secure Storage and Handling.
Enabling Targeted Monitoring. Mapping Investigative Workflows. Establish
Continuing Education. Maintaining Evidence-Based Reporting. Ensuring Legal
Review. Accomplishing Digital Forensic Readiness. III: INTEGRATING DIGITAL
FORENSICS. Forensics Readiness in Cloud Environments. Forensics Readiness
with Mobile Devices. Forensics Readiness and the Internet of Things. IV:
ADDENDUMS. A: Tool and Equipment Validation Program. B: Service Catalog. C:
Cost-Benefit Analysis. D: Building a Taxonomy. E: Risk Assessment. F:
Threat Modelling. G: Data Warehousing Introduction. H: Requirements
Analysis. V: APPENDIXES. A: Investigative Process Models. B: Education and
Professional Certifications. C: Investigative Workflow. VI: TEMPLATES. 1:
Test Case. 2: Logbook. 3: Chain of Custody. 4: Investigative Final Report.
5: Service Catalog. 6: Business Case. 7: Net Present Value (NPV). 8: Threat
Risk Assessment. 9: Data Source Inventory Matrix. 10: Project Charter. 11:
Requirement Analysis Report.
I: ENABLING DIGITAL FORENSICS. Understanding Digital Forensics.
Investigative Process Methodology. Digital Evidence Management. Ethics and
Conduct. Digital Forensics as a Business. II: ENHANCING DIGITAL FORENSICS.
Understanding Digital Forensic Readiness. Defining Business Risk Scenarios.
Identify Potential Data Sources. Determine Collection Requirements.
Establishing Legal Admissibility. Establish Secure Storage and Handling.
Enabling Targeted Monitoring. Mapping Investigative Workflows. Establish
Continuing Education. Maintaining Evidence-Based Reporting. Ensuring Legal
Review. Accomplishing Digital Forensic Readiness. III: INTEGRATING DIGITAL
FORENSICS. Forensics Readiness in Cloud Environments. Forensics Readiness
with Mobile Devices. Forensics Readiness and the Internet of Things. IV:
ADDENDUMS. A: Tool and Equipment Validation Program. B: Service Catalog. C:
Cost-Benefit Analysis. D: Building a Taxonomy. E: Risk Assessment. F:
Threat Modelling. G: Data Warehousing Introduction. H: Requirements
Analysis. V: APPENDIXES. A: Investigative Process Models. B: Education and
Professional Certifications. C: Investigative Workflow. VI: TEMPLATES. 1:
Test Case. 2: Logbook. 3: Chain of Custody. 4: Investigative Final Report.
5: Service Catalog. 6: Business Case. 7: Net Present Value (NPV). 8: Threat
Risk Assessment. 9: Data Source Inventory Matrix. 10: Project Charter. 11:
Requirement Analysis Report.
Investigative Process Methodology. Digital Evidence Management. Ethics and
Conduct. Digital Forensics as a Business. II: ENHANCING DIGITAL FORENSICS.
Understanding Digital Forensic Readiness. Defining Business Risk Scenarios.
Identify Potential Data Sources. Determine Collection Requirements.
Establishing Legal Admissibility. Establish Secure Storage and Handling.
Enabling Targeted Monitoring. Mapping Investigative Workflows. Establish
Continuing Education. Maintaining Evidence-Based Reporting. Ensuring Legal
Review. Accomplishing Digital Forensic Readiness. III: INTEGRATING DIGITAL
FORENSICS. Forensics Readiness in Cloud Environments. Forensics Readiness
with Mobile Devices. Forensics Readiness and the Internet of Things. IV:
ADDENDUMS. A: Tool and Equipment Validation Program. B: Service Catalog. C:
Cost-Benefit Analysis. D: Building a Taxonomy. E: Risk Assessment. F:
Threat Modelling. G: Data Warehousing Introduction. H: Requirements
Analysis. V: APPENDIXES. A: Investigative Process Models. B: Education and
Professional Certifications. C: Investigative Workflow. VI: TEMPLATES. 1:
Test Case. 2: Logbook. 3: Chain of Custody. 4: Investigative Final Report.
5: Service Catalog. 6: Business Case. 7: Net Present Value (NPV). 8: Threat
Risk Assessment. 9: Data Source Inventory Matrix. 10: Project Charter. 11:
Requirement Analysis Report.