|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1048260348 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180809s2018 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d STF
|d TOH
|d OCLCF
|d N$T
|d EBLCP
|d IDB
|d YDX
|d MERUC
|d MOQ
|d CEF
|d OCLCQ
|d G3B
|d UAB
|d ESU
|d OCLCQ
|d UKAHL
|d OCLCQ
|d K6U
|d OCLCQ
|d VLY
|d COO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1045208531
|a 1045546380
|a 1045686816
|a 1162151173
|
020 |
|
|
|a 9781780174204
|
020 |
|
|
|a 1780174209
|
020 |
|
|
|a 9781780174211
|
020 |
|
|
|a 1780174217
|
020 |
|
|
|a 1780174233
|
020 |
|
|
|a 9781780174235
|
020 |
|
|
|a 1780174225
|
020 |
|
|
|a 9781780174228
|
024 |
8 |
|
|a 9781780174204
|
029 |
1 |
|
|a CHNEW
|b 001023985
|
029 |
1 |
|
|a GBVCP
|b 102987350X
|
029 |
1 |
|
|a AU@
|b 000066452920
|
029 |
1 |
|
|a AU@
|b 000073116413
|
035 |
|
|
|a (OCoLC)1048260348
|z (OCoLC)1045208531
|z (OCoLC)1045546380
|z (OCoLC)1045686816
|z (OCoLC)1162151173
|
037 |
|
|
|a CL0500000984
|b Safari Books Online
|
050 |
|
4 |
|a HV6773
|
072 |
|
7 |
|a SOC
|x 004000
|2 bisacsh
|
082 |
0 |
4 |
|a 364.16/8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sheward, Mike,
|e author.
|
245 |
1 |
0 |
|a Hands-on incident response and digital forensics /
|c Mike Sheward.
|
264 |
|
1 |
|a Swindon, UK :
|b BCS Learning & Development,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file.
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 8, 2018).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Copyright Page; CONTENTS; LIST OF FIGURES; AUTHOR; FOREWORD; ACKNOWLEDGEMENTS; GLOSSARY; USEFUL WEBSITES; PREFACE; INTRODUCTION; INCIDENT RESPONSE; DIGITAL FORENSICS; WHY BOTH?; HANDS-ON; HOW THIS BOOK FITS IN; PART 1 INCIDENT RESPONSE; 1 UNDERSTANDING INFORMATION SECURITY INCIDENTS; WHAT IS AN INFORMATION SECURITY INCIDENT?; TYPES OF INCIDENT; DETECTING SECURITY INCIDENTS; WHY DO SECURITY INCIDENTS HAPPEN?; SUMMARY; 2 BEFORE THE INCIDENT; BUILDING THE INCIDENT RESPONSE PLAYBOOK; TESTING THE PLAYBOOK; INCIDENT PLANNING AND COMPLIANCE; FORENSIC READINESS; SUMMARY.
|
505 |
8 |
|
|a 3 THE INCIDENT RESPONSE PROCESSIDENTIFICATION; CONTAINMENT; ERADICATION; RECOVERY; SUMMARY; 4 THINGS TO AVOID DURING INCIDENT RESPONSE; ERADICATION AND PRESERVATION; AN INCIDENT FROM AN INCIDENT; THE BLAME GAME; IT'S NOT OVER UNTIL IT'S OVER; SUMMARY; 5 AFTER THE INCIDENT; POST MORTEM; QUANTIFY THE IMPACT; FORENSICS; SUMMARY; 6 THE BUSINESS OF INCIDENT RESPONSE; REQUEST FOR PROPOSAL; THE POWER OF PR; MERGERS AND ACQUISITIONS; ESCAPE THE TECHNICAL BUBBLE; INCIDENT RESPONSE SERVICE PROVIDERS; SUMMARY; PART 2 DIGITAL FORENSICS; 7 INTRODUCING THE DIGITAL FORENSICS INVESTIGATION; THE INVESTIGATOR.
|
505 |
8 |
|
|a FORENSICS FUNDAMENTALSARRIVING AT AN INVESTIGATION; INVESTIGATIVE PROCESS; SUMMARY; 8 THE LAWS AND ETHICS OF DIGITAL FORENSICS; CRIMES WITHOUT BORDERS; LAWS APPLICABLE TO FORENSICS; ETHICAL CONSIDERATIONS; SUMMARY; 9 DIGITAL FORENSICS TOOLS; GRAB BAG; FORENSIC HARDWARE; FORENSIC SOFTWARE; SUMMARY; 10 EVIDENCE ACQUISITION BASICS; THE HARD DISK DRIVE; REMOVABLE MEDIA; PROCESSING DISK IMAGES; FILE SYSTEMS; OPERATING SYSTEMS; FILES; ANALYSIS OF ARTEFACTS; SUMMARY; 11 CAPTURING A MOVING TARGET; INCIDENT RESPONSE AND DIGITAL FORENSICS; LIVE ACQUISITION DRIVERS; LIVE ACQUISITION TECHNIQUE.
|
505 |
8 |
|
|a ORDER OF VOLATILITYNETWORK FORENSICS; SUMMARY; 12 MEMORY FORENSICS; UNDERSTANDING MEMORY DEVICES; CAPTURING; ANALYSIS; SUMMARY; 13 CLOUD FORENSICS; CLOUD COMPUTING TERMINOLOGY; ACQUISITION IN THE CLOUD; CONTAINER FORENSICS; FORENSICS IN THE CLOUD?; SUMMARY; 14 MOBILE DEVICE FORENSICS; MOBILE PHONE TERMINOLOGY; SEIZING MOBILE DEVICES; ACQUISITION TYPES AND TOOLS; SMARTPHONES; SUMMARY; 15 REPORTING AND PRESENTING YOUR FINDINGS; LAYOUT AND CONTENT; AUDIENCE; SUMMARY; 16 THE HUMAN ELEMENTS OF AN INVESTIGATION; VICTIMS; PERPETRATORS; INVESTIGATORS; SUMMARY; INDEX; Back Cover.
|
520 |
|
|
|a In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.
|
542 |
|
|
|f Copyright © BCS Learning & Development ltd
|g 2018.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Digital forensic science.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Criminology.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Digital forensic science
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Sheward, Mike.
|t Hands-On Incident Response and Digital Forensics.
|d Swindon : BCS Learning & Development Limited, ©2018
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781780174204/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH34238735
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH34238734
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5614288
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1788975
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15602918
|
994 |
|
|
|a 92
|b IZTAP
|