| Description |
xxi, 601 pages : illustrations ; 23 cm |
| Note(s) |
CW227 |
| Contents |
Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms |
| Local Note / Price |
43.66 |
| Subject(s) |
Computer security.
|
|
Computer crimes -- Investigation.
|
| Alt Author |
Luttgens, Jason T.
|
|
Kazanciyan, Ryan,
|
|
Mandia, Kevin,
|
| ISBN |
0071798684 |
|
9780071798686 |
|