Digital Forensics and Incident Response:
bA practical guide to deploying digital forensic techniques in response to cyber security incidents/bh2About This Book/h2ulliLearn incident response fundamentals and create an effective incident response framework/liliMaster forensics investigation utilizing digital investigative techniques/liliCont...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing Limited
2017
|
Ausgabe: | 1 |
Schlagworte: | |
Zusammenfassung: | bA practical guide to deploying digital forensic techniques in response to cyber security incidents/bh2About This Book/h2ulliLearn incident response fundamentals and create an effective incident response framework/liliMaster forensics investigation utilizing digital investigative techniques/liliContains real-life scenarios that effectively use threat intelligence and modeling techniques/li/ulh2Who This Book Is For/h2This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. It will also help professionals who are new to the incident response/digital forensics role within their organization.h2What You Will Learn/h2ulliCreate and deploy incident response capabilities within your organization/liliBuild a solid foundation for acquiring and handling suitable evidence for later analysis/liliAnalyze collected evidence and determine the root cause of a security incident/liliLearn to integrate digital forensic techniques and procedures into the overall incident response process/liliIntegrate threat intelligence in digital evidence analysis/liliPrepare written documentation for use internally or with external parties such as regulators or law enforcement agencies/li/ulh2In Detail/h2Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.h2Style and approach/h2The book covers practical scenarios and examples in an enterprise setting to give you an understanding of how digital forensics integrates with the overall response to cyber security incidents. |
Beschreibung: | 1 Online-Ressource (324 Seiten) |
ISBN: | 9781787285392 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047070101 | ||
003 | DE-604 | ||
005 | 20211214 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2017 |||| o||u| ||||||eng d | ||
020 | |a 9781787285392 |9 978-1-78728-539-2 | ||
035 | |a (ZDB-5-WPSE)9781787285392324 | ||
035 | |a (OCoLC)1227482587 | ||
035 | |a (DE-599)BVBBV047070101 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
100 | 1 | |a Johansen, Gerard |e Verfasser |4 aut | |
245 | 1 | 0 | |a Digital Forensics and Incident Response |c Johansen, Gerard |
250 | |a 1 | ||
264 | 1 | |a Birmingham |b Packt Publishing Limited |c 2017 | |
300 | |a 1 Online-Ressource (324 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a bA practical guide to deploying digital forensic techniques in response to cyber security incidents/bh2About This Book/h2ulliLearn incident response fundamentals and create an effective incident response framework/liliMaster forensics investigation utilizing digital investigative techniques/liliContains real-life scenarios that effectively use threat intelligence and modeling techniques/li/ulh2Who This Book Is For/h2This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. | ||
520 | |a It will also help professionals who are new to the incident response/digital forensics role within their organization.h2What You Will Learn/h2ulliCreate and deploy incident response capabilities within your organization/liliBuild a solid foundation for acquiring and handling suitable evidence for later analysis/liliAnalyze collected evidence and determine the root cause of a security incident/liliLearn to integrate digital forensic techniques and procedures into the overall incident response process/liliIntegrate threat intelligence in digital evidence analysis/liliPrepare written documentation for use internally or with external parties such as regulators or law enforcement agencies/li/ulh2In Detail/h2Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, | ||
520 | |a starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.h2Style and approach/h2The book covers practical scenarios and examples in an enterprise setting to give you an understanding of how digital forensics integrates with the overall response to cyber security incidents. | ||
650 | 4 | |a COMPUTERS / Security / Viruses & | |
650 | 4 | |a Malware | |
650 | 4 | |a COMPUTERS / Security / Networking | |
912 | |a ZDB-5-WPSE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032477127 |
Datensatz im Suchindex
_version_ | 1804182072594530304 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Johansen, Gerard |
author_facet | Johansen, Gerard |
author_role | aut |
author_sort | Johansen, Gerard |
author_variant | g j gj |
building | Verbundindex |
bvnumber | BV047070101 |
collection | ZDB-5-WPSE |
ctrlnum | (ZDB-5-WPSE)9781787285392324 (OCoLC)1227482587 (DE-599)BVBBV047070101 |
edition | 1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03453nmm a2200349zc 4500</leader><controlfield tag="001">BV047070101</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211214 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787285392</subfield><subfield code="9">978-1-78728-539-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781787285392324</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227482587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047070101</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johansen, Gerard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital Forensics and Incident Response</subfield><subfield code="c">Johansen, Gerard</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing Limited</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (324 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">bA practical guide to deploying digital forensic techniques in response to cyber security incidents/bh2About This Book/h2ulliLearn incident response fundamentals and create an effective incident response framework/liliMaster forensics investigation utilizing digital investigative techniques/liliContains real-life scenarios that effectively use threat intelligence and modeling techniques/li/ulh2Who This Book Is For/h2This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">It will also help professionals who are new to the incident response/digital forensics role within their organization.h2What You Will Learn/h2ulliCreate and deploy incident response capabilities within your organization/liliBuild a solid foundation for acquiring and handling suitable evidence for later analysis/liliAnalyze collected evidence and determine the root cause of a security incident/liliLearn to integrate digital forensic techniques and procedures into the overall incident response process/liliIntegrate threat intelligence in digital evidence analysis/liliPrepare written documentation for use internally or with external parties such as regulators or law enforcement agencies/li/ulh2In Detail/h2Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.h2Style and approach/h2The book covers practical scenarios and examples in an enterprise setting to give you an understanding of how digital forensics integrates with the overall response to cyber security incidents. </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Viruses &amp</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Networking</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032477127</subfield></datafield></record></collection> |
id | DE-604.BV047070101 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:34Z |
indexdate | 2024-07-10T09:01:44Z |
institution | BVB |
isbn | 9781787285392 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032477127 |
oclc_num | 1227482587 |
open_access_boolean | |
physical | 1 Online-Ressource (324 Seiten) |
psigel | ZDB-5-WPSE |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing Limited |
record_format | marc |
spelling | Johansen, Gerard Verfasser aut Digital Forensics and Incident Response Johansen, Gerard 1 Birmingham Packt Publishing Limited 2017 1 Online-Ressource (324 Seiten) txt rdacontent c rdamedia cr rdacarrier bA practical guide to deploying digital forensic techniques in response to cyber security incidents/bh2About This Book/h2ulliLearn incident response fundamentals and create an effective incident response framework/liliMaster forensics investigation utilizing digital investigative techniques/liliContains real-life scenarios that effectively use threat intelligence and modeling techniques/li/ulh2Who This Book Is For/h2This book is targeted at Information Security professionals, forensics practitioners, and students with knowledge and experience in the use of software applications and basic command-line experience. It will also help professionals who are new to the incident response/digital forensics role within their organization.h2What You Will Learn/h2ulliCreate and deploy incident response capabilities within your organization/liliBuild a solid foundation for acquiring and handling suitable evidence for later analysis/liliAnalyze collected evidence and determine the root cause of a security incident/liliLearn to integrate digital forensic techniques and procedures into the overall incident response process/liliIntegrate threat intelligence in digital evidence analysis/liliPrepare written documentation for use internally or with external parties such as regulators or law enforcement agencies/li/ulh2In Detail/h2Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed examination of digital forensic techniques including acquiring evidence, examining volatile memory, hard drive assessment, and network-based evidence. You will also explore the role that threat intelligence plays in the incident response process. Finally, a detailed section on preparing reports will help you prepare a written report for use either internally or in a courtroom.By the end of the book, you will have mastered forensic techniques and incident response and you will have a solid foundation on which to increase your ability to investigate such incidents in your organization.h2Style and approach/h2The book covers practical scenarios and examples in an enterprise setting to give you an understanding of how digital forensics integrates with the overall response to cyber security incidents. COMPUTERS / Security / Viruses & Malware COMPUTERS / Security / Networking |
spellingShingle | Johansen, Gerard Digital Forensics and Incident Response COMPUTERS / Security / Viruses & Malware COMPUTERS / Security / Networking |
title | Digital Forensics and Incident Response |
title_auth | Digital Forensics and Incident Response |
title_exact_search | Digital Forensics and Incident Response |
title_exact_search_txtP | Digital Forensics and Incident Response |
title_full | Digital Forensics and Incident Response Johansen, Gerard |
title_fullStr | Digital Forensics and Incident Response Johansen, Gerard |
title_full_unstemmed | Digital Forensics and Incident Response Johansen, Gerard |
title_short | Digital Forensics and Incident Response |
title_sort | digital forensics and incident response |
topic | COMPUTERS / Security / Viruses & Malware COMPUTERS / Security / Networking |
topic_facet | COMPUTERS / Security / Viruses & Malware COMPUTERS / Security / Networking |
work_keys_str_mv | AT johansengerard digitalforensicsandincidentresponse |