|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn880901240 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
140505s2013 vtu ob 001 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d EBLCP
|d NMC
|d COO
|d OCLCF
|d VLB
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ZCU
|d MERUC
|d OCLCQ
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 863821592
|
020 |
|
|
|a 9780124047259
|
020 |
|
|
|a 0124047254
|
020 |
|
|
|a 9781597499965
|q (alk. paper)
|
020 |
|
|
|a 159749996X
|q (alk. paper)
|
029 |
0 |
|
|a AU@
|b 000052913813
|
029 |
1 |
|
|a AU@
|b 000054918512
|
029 |
1 |
|
|a DEBBG
|b BV044062442
|
029 |
1 |
|
|a DEBSZ
|b 431307768
|
029 |
1 |
|
|a AU@
|b 000067093107
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999942515905765
|
035 |
|
|
|a (OCoLC)880901240
|z (OCoLC)863821592
|
050 |
|
4 |
|a HV8079.C65 .C637 2014
|
082 |
0 |
4 |
|a 658.478
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Johnson, Leighton.
|
245 |
1 |
0 |
|a Computer Incident Response and Forensics Team Management :
|b Conducting a Successful Incident Response.
|
260 |
|
|
|a Burlington :
|b Elsevier Science,
|c 2013.
|
300 |
|
|
|a 1 online resource (349 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Computer Incident Response and Forensics Team Management; Copyright Page; Dedication; Contents; About the Author; 1 Introduction; 2 Definitions; 1 Incident Response Team; 3 The Stages of Incident Response; Methodology #1; Preparation; Identification; Containment; Investigation; Eradication; Recovery; Follow-Up; Methodology #2; Preparation; Detection and Analysis; Containment, Eradication, and Recovery; Post-incident Activity; Secure and Evaluate the Scene; Document the Scene; Perform Evidence Collection; Package, Transport, and Store the Collected Digital Evidence.
|
505 |
8 |
|
|a Packaging ProceduresTransportation Procedures; Storage Procedures; 4 The Security Incident Response Team Members; Types of Technical Skills Needed; Types of Personal Skills Needed; 5 Incident Evidence; 6 Incident Response Tools; 7 Incident Response Policies and Procedures; SIRT IR Policies; Incident Response Plan; Corporate IR Strategy and General Use Security Policies; 8 Legal Requirements and Considerations; Privacy; Ethics; Investigation Guidelines; US Federal Rules of Evidence; US Federal Rules for Civil Procedures; 9 Governmental Laws, Policies, and Procedures; US Government; Privacy Act.
|
505 |
8 |
|
|a Computer Security ActClinger-Cohen Act; Computer Fraud & Abuse Act; COPPA; Electronic Communications Privacy Act of 1986 (ECPA); FISMA; USA Patriot Act; Canadian Government; EU; 2 Forensics Team; 10 Forensics Process; Prepare; Identify; Preserve; Select; Examine; Classify; Analyze; Present; 11 Forensics Team Requirements Members; Member Criteria; Forensics Analyst or Specialist; Forensics Investigator; Forensics Examiner; Member Expertise; Forensics Expertise Areas; Developing and Refining the Investigation Plan; Member Certification; Vendor Neutral Certifications; Certified Computer Examiner.
|
505 |
8 |
|
|a Certified Forensic Computer ExaminerCyberSecurity Forensic Analyst; Certified Hacking Forensics Investigator; Certified Information Forensics Investigator; Certified Computer Forensics Examiner; SANS Forensics; Global Information Assurance Certification Forensic Analyst (GCFA); Global Information Assurance Certification Forensic Examiner; Certified Skills That GCFEs Possess; Malware Analyst; GIAC Malware Analysis Certification: GREM; Certified Skills That GREM Certified Professionals Possess; Digital Forensics Certified Practitioner or Digital Forensics Certified Associate.
|
505 |
8 |
|
|a Certified Digital Forensics ExaminerCertified eDiscovery Specialist; Vendor Specific Certifications; EnCase Certified Examiner; EnCase Certified eDiscovery Practitioner; AccessData Certified Examiner; 12 Forensics Team Policies and Procedures; Forensics Analysis Process; Data Collection; Chain of Custody; Evidence Handling and Control; Evidence "Hand-over" to External Parties, LEO; Hardware Specific Acquisition-SIM Cards, Cell Phone, USB Storage, etc.; Data Type Acquisition-Audio Files, Video Files, Image Files, Network Files, Log Files; Investigation Process; Examination Process; Data Review.
|
505 |
8 |
|
|a Research Requirements.
|
520 |
|
|
|a Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and whe.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Evidence, Criminal.
|
650 |
|
0 |
|a Forensic sciences.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Preuve (Droit pénal)
|
650 |
|
6 |
|a Criminalistique.
|
650 |
|
7 |
|a forensic science.
|2 aat
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Evidence, Criminal
|2 fast
|
650 |
|
7 |
|a Forensic sciences
|2 fast
|
758 |
|
|
|i has work:
|a Computer incident response and forensics team management (Work)
|1 https://id.oclc.org/worldcat/entity/E39PCYtT9DGqqpyqFMP6RFGBHd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Johnson, Leighton.
|t Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response.
|d Burlington : Elsevier Science, ©2013
|z 9781597499965
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1115165
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1115165
|
994 |
|
|
|a 92
|b IZTAP
|