Digital forensics and incident response: incident response techniques and procedures to respond to modern cyber threats
bBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniques/b h4Key Features/h4 ulliCreate a solid incident response framework and manage cyber incidents effectively /li liPerform malware analysis for effective incident respon...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
June 2020
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | UBY01 |
Zusammenfassung: | bBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniques/b h4Key Features/h4 ulliCreate a solid incident response framework and manage cyber incidents effectively /li liPerform malware analysis for effective incident response /li liExplore real-life scenarios that effectively use threat intelligence and modeling techniques/li/ul h4Book Description/h4 An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. h4What you will learn/h4 ulliCreate and deploy an incident response capability within your own organization /li liPerform proper evidence acquisition and handling /li liAnalyze the evidence collected and determine the root cause of a security incident /li liBecome well-versed with memory and log analysis /li liIntegrate digital forensic techniques and procedures into the overall incident response process /li liUnderstand the different techniques for threat hunting /li liWrite effective incident reports that document the key findings of your analysis/li/ul h4Who this book is for/h4 This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. |
Beschreibung: | 1 Online-Ressource (vii, 418 Seiten) |
ISBN: | 9781838644086 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047069622 | ||
003 | DE-604 | ||
005 | 20211214 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781838644086 |9 978-1-83864-408-6 | ||
035 | |a (ZDB-5-WPSE)9781838644086448 | ||
035 | |a (ZDB-4-NLEBK)2363873 | ||
035 | |a (OCoLC)1227478058 | ||
035 | |a (DE-599)BVBBV047069622 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Johansen, Gerard |e Verfasser |0 (DE-588)1205294872 |4 aut | |
245 | 1 | 0 | |a Digital forensics and incident response |b incident response techniques and procedures to respond to modern cyber threats |c Gerard Johansen |
250 | |a Second edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c June 2020 | |
300 | |a 1 Online-Ressource (vii, 418 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a bBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniques/b h4Key Features/h4 ulliCreate a solid incident response framework and manage cyber incidents effectively /li liPerform malware analysis for effective incident response /li liExplore real-life scenarios that effectively use threat intelligence and modeling techniques/li/ul h4Book Description/h4 An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. | ||
520 | |a From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. | ||
520 | |a h4What you will learn/h4 ulliCreate and deploy an incident response capability within your own organization /li liPerform proper evidence acquisition and handling /li liAnalyze the evidence collected and determine the root cause of a security incident /li liBecome well-versed with memory and log analysis /li liIntegrate digital forensic techniques and procedures into the overall incident response process /li liUnderstand the different techniques for threat hunting /li liWrite effective incident reports that document the key findings of your analysis/li/ul h4Who this book is for/h4 This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. | ||
650 | 4 | |a COMPUTERS / Security / Networking | |
650 | 4 | |a COMPUTERS / Security / Online Safety & | |
650 | 4 | |a Privacy | |
912 | |a ZDB-5-WPSE |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032476648 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2363873 |l UBY01 |p ZDB-4-NLEBK |q UBY01_DDA21 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182071651860480 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Johansen, Gerard |
author_GND | (DE-588)1205294872 |
author_facet | Johansen, Gerard |
author_role | aut |
author_sort | Johansen, Gerard |
author_variant | g j gj |
building | Verbundindex |
bvnumber | BV047069622 |
collection | ZDB-5-WPSE ZDB-4-NLEBK |
ctrlnum | (ZDB-5-WPSE)9781838644086448 (ZDB-4-NLEBK)2363873 (OCoLC)1227478058 (DE-599)BVBBV047069622 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04008nmm a2200385zc 4500</leader><controlfield tag="001">BV047069622</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211214 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838644086</subfield><subfield code="9">978-1-83864-408-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781838644086448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)2363873</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047069622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johansen, Gerard</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1205294872</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics and incident response</subfield><subfield code="b">incident response techniques and procedures to respond to modern cyber threats</subfield><subfield code="c">Gerard Johansen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">June 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 418 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">bBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniques/b h4Key Features/h4 ulliCreate a solid incident response framework and manage cyber incidents effectively /li liPerform malware analysis for effective incident response /li liExplore real-life scenarios that effectively use threat intelligence and modeling techniques/li/ul h4Book Description/h4 An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">h4What you will learn/h4 ulliCreate and deploy an incident response capability within your own organization /li liPerform proper evidence acquisition and handling /li liAnalyze the evidence collected and determine the root cause of a security incident /li liBecome well-versed with memory and log analysis /li liIntegrate digital forensic techniques and procedures into the overall incident response process /li liUnderstand the different techniques for threat hunting /li liWrite effective incident reports that document the key findings of your analysis/li/ul h4Who this book is for/h4 This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Online Safety &amp</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032476648</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2363873</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA21</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047069622 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:33Z |
indexdate | 2024-07-10T09:01:43Z |
institution | BVB |
isbn | 9781838644086 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032476648 |
oclc_num | 1227478058 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (vii, 418 Seiten) |
psigel | ZDB-5-WPSE ZDB-4-NLEBK ZDB-4-NLEBK UBY01_DDA21 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt |
record_format | marc |
spelling | Johansen, Gerard Verfasser (DE-588)1205294872 aut Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats Gerard Johansen Second edition Birmingham ; Mumbai Packt June 2020 1 Online-Ressource (vii, 418 Seiten) txt rdacontent c rdamedia cr rdacarrier bBuild your organization's cyber defense system by effectively implementing digital forensics and incident management techniques/b h4Key Features/h4 ulliCreate a solid incident response framework and manage cyber incidents effectively /li liPerform malware analysis for effective incident response /li liExplore real-life scenarios that effectively use threat intelligence and modeling techniques/li/ul h4Book Description/h4 An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. h4What you will learn/h4 ulliCreate and deploy an incident response capability within your own organization /li liPerform proper evidence acquisition and handling /li liAnalyze the evidence collected and determine the root cause of a security incident /li liBecome well-versed with memory and log analysis /li liIntegrate digital forensic techniques and procedures into the overall incident response process /li liUnderstand the different techniques for threat hunting /li liWrite effective incident reports that document the key findings of your analysis/li/ul h4Who this book is for/h4 This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
spellingShingle | Johansen, Gerard Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
title | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_auth | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_exact_search | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_exact_search_txtP | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_full | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats Gerard Johansen |
title_fullStr | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats Gerard Johansen |
title_full_unstemmed | Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats Gerard Johansen |
title_short | Digital forensics and incident response |
title_sort | digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_sub | incident response techniques and procedures to respond to modern cyber threats |
topic | COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Security / Online Safety & Privacy |
work_keys_str_mv | AT johansengerard digitalforensicsandincidentresponseincidentresponsetechniquesandprocedurestorespondtomoderncyberthreats |