潍坊科技学院图书馆书目检索系统

| 暂存书架(0) | 登录



MARC状态:审校 文献类型:西文图书 浏览次数:7

题名/责任者:
Incident response & computer forensics / Jason T. Luttgens, Matthew Pepe and Kevin Mandia.
版本说明:
Third edition.
出版发行项:
New York : McGraw-Hill Education, [2014]
ISBN:
9780071798686
ISBN:
0071798684
载体形态项:
xxi, 601 pages : illustrations ; 23 cm
个人责任者:
Pepe, Matthew, author.
附加个人名称:
Luttgens, Jason T., author.
附加个人名称:
Kazanciyan, Ryan, author.
附加个人名称:
Mandia, Kevin, author.
论题主题:
Computer security.
论题主题:
Computer crimes-Investigation.
论题主题:
Computer Security
论题主题:
Se curite informatique.
论题主题:
Criminalite informatique-Enque tes.
论题主题:
Computer crimes-Investigation
论题主题:
Computer security
论题主题:
Re seaux d'ordinateurs-Mesures de su rete .
论题主题:
Criminalite informatique-Enque tes.
中图法分类号:
TP3
一般附注:
Previous edition: 2003.
一般附注:
Includes index.
摘要附注:
The all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response & Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting today's most common types of incidents. Specific, detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics. Special features highlight important tips for security practitioners: the Law Enforcement feature that appears throughout all chapters provides advice on when and how law enforcement must be informed; the What Can Happen feature shows how badly certain scenarios could turn out (with non-action or wrong-action) and why; the Where to Look feature guides you through the fastest routes to key evidence; and the Eye Witness feature details relevant real-world cases for context and urgency. Part I: Introduction to Incident Response covers real-world incidents, an introduction to the incident response process, preparation for incident response, and what happens after the detection of an incident. Part II: Data Collection covers live data collection from Windows and UNIX systems, forensic duplication, collecting network-based evidence, and evidence handling. Part III: Data Analysis covers computer system storage fundamentals, data analysis techniques, investigating Windows and UNIX systems, analyzing network traffic, investigating hacker tools, investigating routers, and writing computer forensic reports. The most technically rigorous handbook on incident handling available All-new advice on architecting networks from the ground-up to fight intrusions New details on streamlining intrusion diagnoses for faster recovery New coverage of: log file and massive data analysis; memory analysis; social media portals to entry; malware analysis; and mobile device-originated breaches New real-world scenarios added throughout exemplify the latest, most prevalent incident types New and up-to-date methods for investigating and assessing hackers' latest tools A forensics-forward approach to handling and protecting sensitive data without further compromising systems. -- Provided by publisher.
全部MARC细节信息>>
索书号 条码号 年卷期 馆藏地 书刊状态 还书位置
TP3/X7=3 X002909   经济书库-外文图书417     可借 经济书库-外文图书417
显示全部馆藏信息
CADAL相关电子图书
借阅趋势

同名作者的其他著作(点击查看)
用户名:
密码:
验证码:
请输入下面显示的内容
  证件号 条码号 Email
 
姓名:
手机号:
送 书 地:
收藏到: 管理书架