000 04769cam a2200469 i 4500
001 18740676
005 20251010064202.0
008 150812s2014 nyua 001 0 eng d
010 _a 2015460939
015 _aGBB335554
_2bnb
016 7 _a016315460
_2Uk
020 _a9780071798686
_qpbk.
020 _a0071798684
_qpbk.
035 _a18740676
035 _a(OCoLC)839312776
040 _aUKMGB
_beng
_cUCC Library
_dOCLCO
_dYDXCP
_dBTCTA
_dBDX
_dOCLCF
_erda
_dSINLB
_dOCLCO
_dHF9
_dCDX
_dDLC
042 _alccopycat
050 0 0 _aHV8079.C65
_bP476 2014
082 0 4 _a005.8
_223
100 1 _aLuttgens, Jason. T,
_eauthor.
245 1 0 _aIncident response & computer forensics /
_bJason T. Luttgens, Matthew Pepe and Kevin Mandia.
250 _aThird edition
264 1 _aNew York :
_bMcGraw-Hill Education,
_c[2014]
300 _axIx, 601 pages :
_billustrations ;
_c23 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
500 _aPrevious ed.: 2003.
500 _aIncludes index.
505 0 _aPart 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms
520 _aThe all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response & Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting today's most common types of incidents. Specific, detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics. Special features highlight important tips for security practitioners: the Law Enforcement feature that appears throughout all chapters provides advice on when and how law enforcement must be informed; the What Can Happen feature shows how badly certain scenarios could turn out (with non-action or wrong-action) and why; the Where to Look feature guides you through the fastest routes to key evidence; and the Eye Witness feature details relevant real-world cases for context and urgency. Part I: Introduction to Incident Response covers real-world incidents, an introduction to the incident response process, preparation for incident response, and what happens after the detection of an incident. Part II: Data Collection covers live data collection from Windows and UNIX systems, forensic duplication, collecting network-based evidence, and evidence handling. Part III: Data Analysis covers computer system storage fundamentals, data analysis techniques, investigating Windows and UNIX systems, analyzing network traffic, investigating hacker tools, investigating routers, and writing computer forensic reports. The most technically rigorous handbook on incident handling available All-new advice on architecting networks from the ground-up to fight intrusions New details on streamlining intrusion diagnoses for faster recovery New coverage of: log file and massive data analysis; memory analysis; social media portals to entry; malware analysis; and mobile device-originated breaches New real-world scenarios added throughout exemplify the latest, most prevalent incident types New and up-to-date methods for investigating and assessing hackers' latest tools A forensics-forward approach to handling and protecting sensitive data without further compromising systems. -- Provided by publisher.
650 0 _aComputer security.
_99
650 0 _aComputer crimes
_xInvestigation.
650 7 _aComputer crimes
_xInvestigation.
_2fast
_0(OCoLC)fst00872065
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_99
700 1 _aLuttgens, Jason T.
_eauthor.
700 1 _aKazanciyan, Ryan,
_eauthor.
700 1 _aMandia, Kevin,
_eauthor.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_n0
999 _c855
_d855