Digital Forensics and Incident Response Digital Forensics and Incident Response

Digital Forensics and Incident Response

A practical guide to deploying digital forensic techniques in response to cyber security incidents

    • 29,99 €
    • 29,99 €

Beschreibung des Verlags

Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.

By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.

GENRE
Computer und Internet
ERSCHIENEN
2017
24. Juli
SPRACHE
EN
Englisch
UMFANG
324
Seiten
VERLAG
Packt Publishing
GRÖSSE
23
 MB

Mehr Bücher von Gerard Johansen

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
2016
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
2024
Digital Forensics and Incident Response. Digital Forensics and Incident Response.
2022
Digital Forensics and Incident Response Digital Forensics and Incident Response
2022
Digital Forensics and Incident Response Digital Forensics and Incident Response
2020
Kali Linux 2018: Assuring Security by Penetration Testing Kali Linux 2018: Assuring Security by Penetration Testing
2018