Cargando…

Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response.

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incide...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Johnson, Leighton
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington : Elsevier Science, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn880901240
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 140505s2013 vtu ob 001 0 eng
040 |a AU@  |b eng  |e pn  |c AU@  |d EBLCP  |d NMC  |d COO  |d OCLCF  |d VLB  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d ZCU  |d MERUC  |d OCLCQ  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 863821592 
020 |a 9780124047259 
020 |a 0124047254 
020 |a 9781597499965  |q (alk. paper) 
020 |a 159749996X  |q (alk. paper) 
029 0 |a AU@  |b 000052913813 
029 1 |a AU@  |b 000054918512 
029 1 |a DEBBG  |b BV044062442 
029 1 |a DEBSZ  |b 431307768 
029 1 |a AU@  |b 000067093107 
029 1 |a DKDLA  |b 820120-katalog:999942515905765 
035 |a (OCoLC)880901240  |z (OCoLC)863821592 
050 4 |a HV8079.C65 .C637 2014 
082 0 4 |a 658.478 
049 |a UAMI 
100 1 |a Johnson, Leighton. 
245 1 0 |a Computer Incident Response and Forensics Team Management :  |b Conducting a Successful Incident Response. 
260 |a Burlington :  |b Elsevier Science,  |c 2013. 
300 |a 1 online resource (349 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Front Cover; Computer Incident Response and Forensics Team Management; Copyright Page; Dedication; Contents; About the Author; 1 Introduction; 2 Definitions; 1 Incident Response Team; 3 The Stages of Incident Response; Methodology #1; Preparation; Identification; Containment; Investigation; Eradication; Recovery; Follow-Up; Methodology #2; Preparation; Detection and Analysis; Containment, Eradication, and Recovery; Post-incident Activity; Secure and Evaluate the Scene; Document the Scene; Perform Evidence Collection; Package, Transport, and Store the Collected Digital Evidence. 
505 8 |a Packaging ProceduresTransportation Procedures; Storage Procedures; 4 The Security Incident Response Team Members; Types of Technical Skills Needed; Types of Personal Skills Needed; 5 Incident Evidence; 6 Incident Response Tools; 7 Incident Response Policies and Procedures; SIRT IR Policies; Incident Response Plan; Corporate IR Strategy and General Use Security Policies; 8 Legal Requirements and Considerations; Privacy; Ethics; Investigation Guidelines; US Federal Rules of Evidence; US Federal Rules for Civil Procedures; 9 Governmental Laws, Policies, and Procedures; US Government; Privacy Act. 
505 8 |a Computer Security ActClinger-Cohen Act; Computer Fraud & Abuse Act; COPPA; Electronic Communications Privacy Act of 1986 (ECPA); FISMA; USA Patriot Act; Canadian Government; EU; 2 Forensics Team; 10 Forensics Process; Prepare; Identify; Preserve; Select; Examine; Classify; Analyze; Present; 11 Forensics Team Requirements Members; Member Criteria; Forensics Analyst or Specialist; Forensics Investigator; Forensics Examiner; Member Expertise; Forensics Expertise Areas; Developing and Refining the Investigation Plan; Member Certification; Vendor Neutral Certifications; Certified Computer Examiner. 
505 8 |a Certified Forensic Computer ExaminerCyberSecurity Forensic Analyst; Certified Hacking Forensics Investigator; Certified Information Forensics Investigator; Certified Computer Forensics Examiner; SANS Forensics; Global Information Assurance Certification Forensic Analyst (GCFA); Global Information Assurance Certification Forensic Examiner; Certified Skills That GCFEs Possess; Malware Analyst; GIAC Malware Analysis Certification: GREM; Certified Skills That GREM Certified Professionals Possess; Digital Forensics Certified Practitioner or Digital Forensics Certified Associate. 
505 8 |a Certified Digital Forensics ExaminerCertified eDiscovery Specialist; Vendor Specific Certifications; EnCase Certified Examiner; EnCase Certified eDiscovery Practitioner; AccessData Certified Examiner; 12 Forensics Team Policies and Procedures; Forensics Analysis Process; Data Collection; Chain of Custody; Evidence Handling and Control; Evidence "Hand-over" to External Parties, LEO; Hardware Specific Acquisition-SIM Cards, Cell Phone, USB Storage, etc.; Data Type Acquisition-Audio Files, Video Files, Image Files, Network Files, Log Files; Investigation Process; Examination Process; Data Review. 
505 8 |a Research Requirements. 
520 |a Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and whe. 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Evidence, Criminal. 
650 0 |a Forensic sciences. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Preuve (Droit pénal) 
650 6 |a Criminalistique. 
650 7 |a forensic science.  |2 aat 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Evidence, Criminal  |2 fast 
650 7 |a Forensic sciences  |2 fast 
758 |i has work:  |a Computer incident response and forensics team management (Work)  |1 https://id.oclc.org/worldcat/entity/E39PCYtT9DGqqpyqFMP6RFGBHd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Johnson, Leighton.  |t Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response.  |d Burlington : Elsevier Science, ©2013  |z 9781597499965 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1115165  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1115165 
994 |a 92  |b IZTAP