|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn894514708 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141105s2014 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d REB
|d DEBBG
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d TOH
|d EBLCP
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164492360
|a 1228904203
|
020 |
|
|
|a 9780071798693
|
020 |
|
|
|a 0071798692
|
020 |
|
|
|a 0071798684
|
020 |
|
|
|a 9780071798686
|
020 |
|
|
|z 9780071798686
|
029 |
1 |
|
|a DEBBG
|b BV042490061
|
029 |
1 |
|
|a DEBSZ
|b 434832421
|
035 |
|
|
|a (OCoLC)894514708
|z (OCoLC)1164492360
|z (OCoLC)1228904203
|
037 |
|
|
|a CL0500000498
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b .L888 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Luttgens, Jason T.
|
245 |
1 |
0 |
|a Incident response & computer forensics /
|c Jason T. Luttgens, Matthew Pepe.
|
246 |
3 |
|
|a Incident response and computer forensic
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 29, 2014).
|
500 |
|
|
|a Includes index.
|
520 |
8 |
|
|a Annotation
|b The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediationDevelop leads, identify indicators of compromise, and determine incident scopeCollect and preserve live dataPerform forensic duplicationAnalyze data from networks, enterprise services, and applicationsInvestigate Windows and Mac OS X systemsPerform malware triageWrite detailed incident response reportsCreate and implement comprehensive remediation plans.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- About the Authors -- About the Contributors -- About the Technical Editor -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Preparing for the Inevitable Incident -- Chapter 1: Real-World Incidents -- What Constitutes an Incident? -- What Is Incident Response? -- Where We Are Now -- Why Should You Care About Incident Response? -- Case Studies -- Case Study #1: Show Me the Money -- Case Study #2: Certificate of Authenticity -- Concept of the Attack Lifecycle -- So What? -- Questions -- Chapter 2: IR Management Handbook
|
505 |
8 |
|
|a What Is a Computer Security Incident? -- What Are the Goals of Incident Response? -- Who Is Involved in the IR Process? -- Finding IR Talent -- The Incident Response Process -- Initial Response -- Investigation -- Remediation -- Tracking of Significant Investigative Information -- Reporting -- So What? -- Questions -- Chapter 3: Pre-Incident Preparation -- Preparing the Organization for Incident Response -- Identifying Risk -- Policies That Promote a Successful IR -- Working with Outsourced IT -- Thoughts on Global Infrastructure Issues -- Educating Users on Host-Based Security
|
505 |
8 |
|
|a Preparing the IR Team -- Defining the Mission -- Communication Procedures -- Deliverables -- Resources for the IR Team -- Preparing the Infrastructure for Incident Response -- Computing Device Configuration -- Network Configuration -- So What? -- Questions -- Part II: Incident Detection and Characterization -- Chapter 4: Getting the Investigation Started on the Right Foot -- Collecting Initial Facts -- Checklists -- Maintenance of Case Notes -- Building an Attack Timeline -- Understanding Investigative Priorities -- What Are Elements of Proof? -- Setting Expectations with Management -- So What?
|
505 |
8 |
|
|a Questions -- Chapter 5: Initial Development of Leads -- Defining Leads of Value -- Acting on Leads -- Turning Leads into Indicators -- The Lifecycle of Indicator Generation -- Resolving Internal Leads -- Resolving External Leads -- So What? -- Questions -- Chapter 6: Discovering the Scope of the Incident -- What Should I Do? -- Examining Initial Data -- Gathering and Reviewing Preliminary Evidence -- Determining a Course of Action -- Customer Data Loss Scenario -- Customer Data Loss-Scoping Gone Wrong -- Automated Clearing House (ACH) Fraud Scenario -- ACH Fraud-Scoping Gone Wrong -- So What?
|
505 |
8 |
|
|a Questions -- Part III: Data Collection -- Chapter 7: Live Data Collection -- When to Perform a Live Response -- Selecting a Live Response Tool -- What to Collect -- Collection Best Practices -- Live Data Collection on Microsoft Windows Systems -- Prebuilt Toolkits -- Do It Yourself -- Memory Collection -- Live Data Collection on Unix-Based Systems -- Live Response Toolkits -- Memory Collection -- So What? -- Questions -- Chapter 8: Forensic Duplication -- Forensic Image Formats -- Complete Disk Image -- Partition Image -- Logical Image -- Image Integrity -- Traditional Duplication
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Pepe, Mathew.
|
776 |
0 |
8 |
|i Print version:
|a Luttgens, Jason T.
|t Incident Response and Computer Forensics, Third Edition.
|d : McGraw-Hill Education, ©2014
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071798686/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258019
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2688522
|
994 |
|
|
|a 92
|b IZTAP
|