9780071798686-0071798684-Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition

ISBN-13: 9780071798686
ISBN-10: 0071798684
Edition: 3
Author: Jason T. Luttgens, Matthew Pepe, Kevin Mandia
Publication date: 2014
Publisher: McGraw Hill
Format: Paperback 624 pages
FREE US shipping
Rent
35 days
from $8.76 USD
FREE shipping on RENTAL RETURNS
Buy

From $18.15

Rent

From $8.76

Book details

ISBN-13: 9780071798686
ISBN-10: 0071798684
Edition: 3
Author: Jason T. Luttgens, Matthew Pepe, Kevin Mandia
Publication date: 2014
Publisher: McGraw Hill
Format: Paperback 624 pages

Summary

Incident Response & Computer Forensics, Third Edition (ISBN-13: 9780071798686 and ISBN-10: 0071798684), written by authors Jason T. Luttgens, Matthew Pepe, Kevin Mandia, was published by McGraw Hill in 2014. With an overall rating of 4.1 stars, it's a notable title among other Internet, Groupware, & Telecommunications (Networking & Cloud Computing, Network Security, Security & Encryption, Internet & Social Media, Privacy & Online Safety) books. You can easily purchase or rent Incident Response & Computer Forensics, Third Edition (Paperback, Used) from BooksRun, along with many other new and used Internet, Groupware, & Telecommunications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $5.64.

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book