Skip to main content Site map

Incident Response & Computer Forensics, Third Edition 3rd edition


Incident Response & Computer Forensics, Third Edition 3rd edition

Paperback by Luttgens, Jason; Pepe, Matthew; Mandia, Kevin

Incident Response & Computer Forensics, Third Edition

£49.99

ISBN:
9780071798686
Publication Date:
16 Mar 2014
Edition/language:
3rd edition / English
Publisher:
McGraw-Hill Education - Europe
Imprint:
Osborne/McGraw-Hill
Pages:
624 pages
Format:
Paperback
For delivery:
Estimated despatch 1 May 2024
Incident Response & Computer Forensics, Third Edition

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

Contents

Part 1 PREPARING FOR THE INEVITABLE INCIDENT 1Real World Incidents 2IR Management Handbook 3Pre-Incident Preparation Part 2 INCIDENT DETECTION AND CHARACTERIZATION 4Getting the Investigation Started 5Initial Development of Leads 6Discovering the Scope of the Incident Part 3 DATA COLLECTION 7Live Data Collection 8Forensic Duplication 9Network Evidence 10Enterprise Services Part 4 DATA ANALYSIS 11Analysis Methodology 12Investigating Windows Systems 13Investigating MacOS Systems 14Investigating Applications 15Malware Triage 16Report Writing Part 5 REMEDIATION 17Remediation Introduction 18Remediation Case Studies Part 6 APPENDICES App AAnswers to Questions App BIncident Response Forms

Back

University of Sunderland logo