Computer incident response and forensics team management : conducting a successful incident response /
This book provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This approach demonstrates the concepts and principles needed to conduct a successful incident response investigation, ensuring that proven policies and...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland :
Syngress,
2014.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn861649048 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131016r20142013nyu ob 001 0 eng d | ||
040 | |a UKMGB |b eng |e pn |c UKMGB |d OCLCO |d IDEBK |d YDXCP |d UIU |d SFB |d CDX |d GGVRL |d B24X7 |d UMI |d N$T |d COO |d DEBBG |d TEFOD |d OCLCF |d TEFOD |d OCLCQ |d TEFOD |d OCLCQ |d ICA |d AGLDB |d LIV |d OCLCQ |d OCLCA |d VNS |d U3W |d D6H |d OCLCQ |d VTS |d CEF |d UAB |d OTZ |d M8D |d OCLCO |d OCLCQ |d TOH |d OCLCQ |d OCLCO | ||
016 | 7 | |a 016525902 |2 Uk | |
019 | |a 880640875 |a 966353591 | ||
020 | |a 9780124047259 |q (electronic bk.) | ||
020 | |a 0124047254 |q (electronic bk.) | ||
020 | |z 9781597499965 | ||
020 | |z 159749996X | ||
029 | 1 | |a AU@ |b 000053308483 | |
029 | 1 | |a CHBIS |b 010480775 | |
029 | 1 | |a CHNEW |b 001011498 | |
029 | 1 | |a CHVBK |b 33692478X | |
029 | 1 | |a DEBBG |b BV042032757 | |
029 | 1 | |a DEBBG |b BV043960482 | |
029 | 1 | |a DEBSZ |b 414182308 | |
029 | 1 | |a DEBSZ |b 481276718 | |
029 | 1 | |a GBVCP |b 814280544 | |
035 | |a (OCoLC)861649048 |z (OCoLC)880640875 |z (OCoLC)966353591 | ||
037 | |a FB4009B5-F513-40F1-B4A1-1D896A505CF0 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HV8079.C65 |b J637 2014 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Johnson, Leighton, |e author. | |
245 | 1 | 0 | |a Computer incident response and forensics team management : |b conducting a successful incident response / |c by Leighton Johnson. |
264 | 1 | |a Rockland : |b Syngress, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Previously issued in print. 2013. | ||
588 | 0 | |a CIP data: resource not viewed. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion. | |
520 | |a This book provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This approach demonstrates the concepts and principles needed to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer crimes |x Investigation. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 7 | |a COMPUTERS/Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS/Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS/Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Computer security |2 fast | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486629 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597499965/?ar |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00056533 | ||
938 | |a Coutts Information Services |b COUT |n 26719253 | ||
938 | |a EBSCOhost |b EBSC |n 486629 | ||
938 | |a Cengage Learning |b GVRL |n GVRL8DCQ | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26719253 | ||
938 | |a YBP Library Services |b YANK |n 11364610 | ||
994 | |a 92 |b IZTAP |