Incident Response: Investigating Computer Crime - Kevin Mandia, Chris Prosise

Incident Response: Investigating Computer Crime

Buch | Softcover
552 Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-213182-6 (ISBN)
37,40 inkl. MwSt
zur Neuauflage
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
This guide, with the help of insider FBI information, disscuses how to respond to hacker attacks after they occur. It includes real case scenarios with insightful tips on how to respond and gives an insiders perspective on the incident reponse process.

Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime. Chris Prosise VP of Consulting at Foundstone, is a recognized network security expert with extensive experience in attack and penetration testing and incident response. Chris has led government and commercial security teams of missions worldwide, from sensitive incident response missions on Top Secret government networks to comprehensive security assessments on some of the worlds largest corporations. Chris is a featured speaker at multiple security conferences such as Forum of Incident Response and Security Teams (FIRST). He has written articles for SysAdmin and is the technical editor of Hacking Exposed.

Part I: Learning the Ropes. Chapter 1: Insiders and Outsiders: A Case Study. Chapter 2: Introduction to Incident Response. Chapter 3: Preparing for Incident Response. Part II: Putting on the Gloves. Chapter 4: Investigative Guidelines. Chapter 5: The Computer Forensic Process. Chapter 6: Learning Network Protocols and Performing a Trap and a Trace. Chapter 7: Performing Network Surveillance. Chapter 8: Advanced Network Surveillance. Part III: Getting in the Ring: Investigating Systems. Chapter 9: Initial Response to Windows NT/2000. Chapter 10: Investigating Windows NT/2000. Chapter 11: Initial Response to UNIX Systems. Chapter 12: Investigating UNIX. Part IV: Investigating Nonplatform-Specific Technology. Chapter 13: Investigating Routers. Chapter 14: Investigating Web Attacks. Chapter 15: Investigating Application Servers. Chapter 16: Investigating Hacker Tools. Part V: Appendices. A: Establishing Identity in Cyberspace. B: Information Security Policies and Acceptable Use Policies. C: Computer Crime Statutes. D: Response Organizations.

Erscheint lt. Verlag 16.7.2001
Zusatzinfo 50 illustrations, appendices
Sprache englisch
Maße 185 x 229 mm
Gewicht 1100 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 0-07-213182-9 / 0072131829
ISBN-13 978-0-07-213182-6 / 9780072131826
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95