|
Product Description
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.
- Architect an infrastructure that allows for methodical investigation and remediation
- Develop leads, identify indicators of compromise, and determine incident scope
- Collect and preserve live data
- Perform forensic duplication
- Analyze data from networks, enterprise services, and applications
- Investigate Windows and Mac OS X systems
- Perform malware triage
- Write detailed incident response reports
- Create and implement comprehensive remediation plans
Features
- McGraw-Hill Osborne Media
Customers Who Bought This Item Also Bought
- Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
- Red Team Development and Operations: A practical guide
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
- Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
- Blue Team Field Manual (BTFM) (RTFM)
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- File System Forensic Analysis
*If this is not the "Incident Response & Computer Forensics, Third Edition" product you were looking for, you can check the other results by clicking this link. Details were last updated on Sep 28, 2024 22:19 +08.