Incident response and computer forensics / (Record no. 9033)

MARC details
000 -LEADER
fixed length control field 04734cam a2200445 i 4500
001 - CONTROL NUMBER
control field 18740676
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190104141311.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150812s2014 nyua 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780071798686 (pbk.)
ISBN 0071798684 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency UKMGB
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Book number LUT/I
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Luttgens, Jason T.
Relator term author.
245 10 - TITLE STATEMENT
Title Incident response and computer forensics /
Sub Title by Jason T. Luttgens, Matthew Pepe and Kevin Mandia.
250 ## - EDITION STATEMENT
Edition statement Third edition
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxi, 601 pages :
Other physical details(ill.) illustrations ;
Dimensions(size) 23 cm
500 ## - GENERAL NOTE
General note Previous ed.: 2003.
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms
520 ## - SUMMARY, ETC.
Summary, etc The all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response & Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting today's most common types of incidents. Specific, detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics. Special features highlight important tips for security practitioners: the Law Enforcement feature that appears throughout all chapters provides advice on when and how law enforcement must be informed; the What Can Happen feature shows how badly certain scenarios could turn out (with non-action or wrong-action) and why; the Where to Look feature guides you through the fastest routes to key evidence; and the Eye Witness feature details relevant real-world cases for context and urgency. Part I: Introduction to Incident Response covers real-world incidents, an introduction to the incident response process, preparation for incident response, and what happens after the detection of an incident. Part II: Data Collection covers live data collection from Windows and UNIX systems, forensic duplication, collecting network-based evidence, and evidence handling. Part III: Data Analysis covers computer system storage fundamentals, data analysis techniques, investigating Windows and UNIX systems, analyzing network traffic, investigating hacker tools, investigating routers, and writing computer forensic reports. The most technically rigorous handbook on incident handling available All-new advice on architecting networks from the ground-up to fight intrusions New details on streamlining intrusion diagnoses for faster recovery New coverage of: log file and massive data analysis; memory analysis; social media portals to entry; malware analysis; and mobile device-originated breaches New real-world scenarios added throughout exemplify the latest, most prevalent incident types New and up-to-date methods for investigating and assessing hackers' latest tools A forensics-forward approach to handling and protecting sensitive data without further compromising systems. -- Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
Topical Term Computer crimes
General subdivision Investigation.
Topical Term Computer crimes
General subdivision Investigation.
Topical Term Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pepe, Matthew,
Relator term author.
Personal name Mandia, Kevin,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Text Book
Koha issues (borrowed), all copies 3
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Full call number Accession Number Price effective from Koha item type
Not withdrawn Not Lost not damaged   Central Library, IIT Bhubaneswar Central Library, IIT Bhubaneswar 25/10/2018 005.8 LUT/I TB8446 25/10/2018 Course Reserve
Not withdrawn Not Lost not damaged   Central Library, IIT Bhubaneswar Central Library, IIT Bhubaneswar 25/10/2018 005.8 LUT/I TB8447 25/10/2018 Text Book
Not withdrawn Not Lost not damaged   Central Library, IIT Bhubaneswar Central Library, IIT Bhubaneswar 25/10/2018 005.8 LUT/I TB8448 25/10/2018 Text Book

Central Library, Indian Institute of Technology Bhubaneswar, 4th Floor, Administrative Building, Argul, Khordha, PIN-752050, Odisha, India
Phone: +91-674-7138750 | Email: circulation.library@iitbbs.ac.in (For circulation related queries),
Email: info.library@iitbbs.ac.in (For other queries)

Powered by Koha