Incident Response & Computer Forensics, 2nd Ed.
McGraw-Hill Professional (Verlag)
978-0-07-222696-6 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime. Chris Prosise VP of Consulting at Foundstone, is a recognized network security expert with extensive experience in attack and penetration testing and incident response. Chris has led government and commercial security teams of missions worldwide, from sensitive incident response missions on Top Secret government networks to comprehensive security assessments on some of the worlds largest corporations. Chris is a featured speaker at multiple security conferences such as Forum of Incident Response and Security Teams (FIRST). He has written articles for SysAdmin and is the technical editor of Hacking Exposed.
Part I: Introduction 1: Real-World Incidents 2: Introduction to the Incident Response Process 3: Preparing for Incident Response 4: After Detection of an Incident Part II: Data Collection 5: Live Data Collection from Windows Systems 6: Live Data Collection from Unix Systems 7: Forensic Duplication 8: Collecting Network-based Evidence 9: Evidence Handling Part III: Data Analysis 10: Computer System Storage Fundamentals 11: Data Analysis Techniques 12: Investigating Windows Systems 13: Investigating Unix Systems 14: Analyzing Network Traffic 15: Investigating Hacker Tools 16: Investigating Routers 17: Writing Computer Forensic Reports Part IV: Appendixes A: Answers to Questions B: Incident Response Forms
Erscheint lt. Verlag | 16.8.2003 |
---|---|
Zusatzinfo | 100 Illustrations, unspecified |
Sprache | englisch |
Maße | 191 x 234 mm |
Gewicht | 912 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Recht / Steuern ► Strafrecht ► Kriminologie | |
ISBN-10 | 0-07-222696-X / 007222696X |
ISBN-13 | 978-0-07-222696-6 / 9780072226966 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich