Cargando…

The effective incident response team /

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents w...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lucas, Julie, 1964-
Otros Autores: Moeller, Brian
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Addison-Wesley, 2004.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn243552052
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 030626s2004 mau ob 001 0 eng d
010 |z  2003057743 
040 |a SFB  |b eng  |e pn  |c SFB  |d CEF  |d OCLCQ  |d OCLCE  |d VLB  |d AZU  |d NHM  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCA  |d WYU  |d UAB  |d VT2  |d CNCEN  |d LDP  |d UKBTH  |d OCLCO  |d HS0  |d OCLCO  |d TOH  |d OCLCO  |d LVT  |d TAC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 606160958  |a 607057804  |a 729548850  |a 748104989  |a 759521852  |a 1044260731  |a 1056348395  |a 1060858532  |a 1064118207  |a 1073061295  |a 1083169671  |a 1100827842  |a 1103253823  |a 1104466063  |a 1105789560  |a 1129349238  |a 1156885722  |a 1159648243  |a 1180305790  |a 1202544509  |a 1224590279  |a 1240523872  |a 1302260665  |a 1302703706 
020 |z 0201761750  |q (alk. paper) 
020 |z 9780201761757  |q (alk. paper) 
024 8 |a 9780201761757 
024 8 |a 0201761750 
029 1 |a HEBIS  |b 291419208 
029 1 |a AU@  |b 000067114274 
035 |a (OCoLC)243552052  |z (OCoLC)606160958  |z (OCoLC)607057804  |z (OCoLC)729548850  |z (OCoLC)748104989  |z (OCoLC)759521852  |z (OCoLC)1044260731  |z (OCoLC)1056348395  |z (OCoLC)1060858532  |z (OCoLC)1064118207  |z (OCoLC)1073061295  |z (OCoLC)1083169671  |z (OCoLC)1100827842  |z (OCoLC)1103253823  |z (OCoLC)1104466063  |z (OCoLC)1105789560  |z (OCoLC)1129349238  |z (OCoLC)1156885722  |z (OCoLC)1159648243  |z (OCoLC)1180305790  |z (OCoLC)1202544509  |z (OCoLC)1224590279  |z (OCoLC)1240523872  |z (OCoLC)1302260665  |z (OCoLC)1302703706 
042 |a dlr 
050 4 |a QA76.9.A25  |b L84 2003 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Lucas, Julie,  |d 1964- 
245 1 4 |a The effective incident response team /  |c Julie Lucas and Brian Moeller. 
260 |a Boston :  |b Addison-Wesley,  |c 2004. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [S.l.] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
520 |a When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003. 
542 |f Copyright © Addison-Wesley Professional  |g 2004 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Computer Science.  |2 hilcc 
653 |a Incident Response 
700 1 |a Moeller, Brian. 
776 0 8 |i Print version:  |a Lucas, Julie, 1964-  |t Effective incident response team.  |d Boston : Addison-Wesley, 2004  |w (DLC) 2003057743 
856 4 0 |u https://learning.oreilly.com/library/view/~/0201761750/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP