Cargando…

Incident response & computer forensics /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Luttgens, Jason T.
Otros Autores: Pepe, Mathew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, ©2014.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn894514708
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141105s2014 nyua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d REB  |d DEBBG  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCA  |d TOH  |d EBLCP  |d N$T  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1164492360  |a 1228904203 
020 |a 9780071798693 
020 |a 0071798692 
020 |a 0071798684 
020 |a 9780071798686 
020 |z 9780071798686 
029 1 |a DEBBG  |b BV042490061 
029 1 |a DEBSZ  |b 434832421 
035 |a (OCoLC)894514708  |z (OCoLC)1164492360  |z (OCoLC)1228904203 
037 |a CL0500000498  |b Safari Books Online 
050 4 |a QA76.9.A25  |b .L888 2014 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Luttgens, Jason T. 
245 1 0 |a Incident response & computer forensics /  |c Jason T. Luttgens, Matthew Pepe. 
246 3 |a Incident response and computer forensic 
250 |a 3rd ed. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed October 29, 2014). 
500 |a Includes index. 
520 8 |a Annotation  |b The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediationDevelop leads, identify indicators of compromise, and determine incident scopeCollect and preserve live dataPerform forensic duplicationAnalyze data from networks, enterprise services, and applicationsInvestigate Windows and Mac OS X systemsPerform malware triageWrite detailed incident response reportsCreate and implement comprehensive remediation plans. 
505 0 |a Cover -- Title Page -- Copyright Page -- About the Authors -- About the Contributors -- About the Technical Editor -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Preparing for the Inevitable Incident -- Chapter 1: Real-World Incidents -- What Constitutes an Incident? -- What Is Incident Response? -- Where We Are Now -- Why Should You Care About Incident Response? -- Case Studies -- Case Study #1: Show Me the Money -- Case Study #2: Certificate of Authenticity -- Concept of the Attack Lifecycle -- So What? -- Questions -- Chapter 2: IR Management Handbook 
505 8 |a What Is a Computer Security Incident? -- What Are the Goals of Incident Response? -- Who Is Involved in the IR Process? -- Finding IR Talent -- The Incident Response Process -- Initial Response -- Investigation -- Remediation -- Tracking of Significant Investigative Information -- Reporting -- So What? -- Questions -- Chapter 3: Pre-Incident Preparation -- Preparing the Organization for Incident Response -- Identifying Risk -- Policies That Promote a Successful IR -- Working with Outsourced IT -- Thoughts on Global Infrastructure Issues -- Educating Users on Host-Based Security 
505 8 |a Preparing the IR Team -- Defining the Mission -- Communication Procedures -- Deliverables -- Resources for the IR Team -- Preparing the Infrastructure for Incident Response -- Computing Device Configuration -- Network Configuration -- So What? -- Questions -- Part II: Incident Detection and Characterization -- Chapter 4: Getting the Investigation Started on the Right Foot -- Collecting Initial Facts -- Checklists -- Maintenance of Case Notes -- Building an Attack Timeline -- Understanding Investigative Priorities -- What Are Elements of Proof? -- Setting Expectations with Management -- So What? 
505 8 |a Questions -- Chapter 5: Initial Development of Leads -- Defining Leads of Value -- Acting on Leads -- Turning Leads into Indicators -- The Lifecycle of Indicator Generation -- Resolving Internal Leads -- Resolving External Leads -- So What? -- Questions -- Chapter 6: Discovering the Scope of the Incident -- What Should I Do? -- Examining Initial Data -- Gathering and Reviewing Preliminary Evidence -- Determining a Course of Action -- Customer Data Loss Scenario -- Customer Data Loss-Scoping Gone Wrong -- Automated Clearing House (ACH) Fraud Scenario -- ACH Fraud-Scoping Gone Wrong -- So What? 
505 8 |a Questions -- Part III: Data Collection -- Chapter 7: Live Data Collection -- When to Perform a Live Response -- Selecting a Live Response Tool -- What to Collect -- Collection Best Practices -- Live Data Collection on Microsoft Windows Systems -- Prebuilt Toolkits -- Do It Yourself -- Memory Collection -- Live Data Collection on Unix-Based Systems -- Live Response Toolkits -- Memory Collection -- So What? -- Questions -- Chapter 8: Forensic Duplication -- Forensic Image Formats -- Complete Disk Image -- Partition Image -- Logical Image -- Image Integrity -- Traditional Duplication 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Sécurité informatique. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Pepe, Mathew. 
776 0 8 |i Print version:  |a Luttgens, Jason T.  |t Incident Response and Computer Forensics, Third Edition.  |d : McGraw-Hill Education, ©2014 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071798686/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258019 
938 |a EBSCOhost  |b EBSC  |n 2688522 
994 |a 92  |b IZTAP