005 |
|
20180622151525.0 |
010 |
|
|a2015460939
|
020 |
|
|a9780071798686|cUS62 (pbk.)
|
020 |
|
|a0071798684 (pbk.)
|
040 |
|
|aUKMGB|beng|cUKMGB|dOCLCO|dYDXCP|dBTCTA|dBDX|dOCLCF|dSINLB|dOCLCO|dHF9|dCDX|dDLC|dNOU
|
050 |
00
|
|aHV8079.C65|bP476 2014
|
082 |
04
|
|a005.8|223
|
095 |
|
|aLB|bLBF|cE019132|dHV8079.C65|eP421|y2014|ffish|pBook
|
100 |
1
|
|aPepe, Matthew,|eauthor.
|
245 |
10
|
|aIncident response & computer forensics /|cJason T. Luttgens, Matthew Pepe [and Kevin Mandia].
|
246 |
3
|
|aIncident response and computer forensic
|
250 |
|
|a3rd ed.
|
260 |
|
|aNew York :|bMcGraw-Hill Education,|cc2014.
|
300 |
|
|axxi, 601 p. :|bill. ;|c23 cm.
|
500 |
|
|aIncludes index.
|
500 |
|
|aPrevious ed.: 2003.
|
505 |
0
|
|aPart 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms
|
650 |
0
|
|aComputer crimes|xInvestigation.
|
650 |
0
|
|aComputer security.
|
700 |
1
|
|aKazanciyan, Ryan,|eauthor.
|
700 |
1
|
|aLuttgens, Jason T.|eauthor.
|
700 |
1
|
|aMandia, Kevin,|eauthor.
|