Digital forensics and incident response :: incident response techniques and procedures to respond to modern cyber threats /
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing Ltd.,
2020.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781838644086 1838644083 9781838649005 183864900X |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1139256488 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 200207s2020 enk ob 001 0 eng d | ||
040 | |a YDX |b eng |e rda |e pn |c YDX |d N$T |d YDXIT |d OCLCQ |d EBLCP |d OCLCF |d VT2 |d UKMGB |d UMI |d AJB |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL | ||
015 | |a GBC067183 |2 bnb | ||
016 | 7 | |a 019712554 |2 Uk | |
019 | |a 1139923657 |a 1153053617 |a 1174318332 |a 1176246153 |a 1181794228 |a 1192347998 |a 1240522396 | ||
020 | |a 9781838644086 |q (electronic book) | ||
020 | |a 1838644083 |q (electronic book) | ||
020 | |a 9781838649005 | ||
020 | |a 183864900X |q (Trade Paper) | ||
024 | 3 | |a 9781838649005 | |
035 | |a (OCoLC)1139256488 |z (OCoLC)1139923657 |z (OCoLC)1153053617 |z (OCoLC)1174318332 |z (OCoLC)1176246153 |z (OCoLC)1181794228 |z (OCoLC)1192347998 |z (OCoLC)1240522396 | ||
037 | |a B14066 |b 01201872 | ||
050 | 4 | |a HV8079.C65 |b J64 2020 | |
050 | 4 | |a HV8073 | |
082 | 7 | |a 363.25/2 |2 23 | |
082 | 7 | |a 363.25 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Johansen, Gerard, |e author. | |
245 | 1 | 0 | |a Digital forensics and incident response : |b incident response techniques and procedures to respond to modern cyber threats / |c Gerard Johansen. |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham : |b Packt Publishing Ltd., |c 2020. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource; title from digital title page (viewed on April 15, 2020). | |
520 | |a An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities. | ||
505 | 0 | |a Section 1. Foundations of Incident Response and Digital Forensics. Chapter 1: Understanding Incident Response ; Chapter 2: Managing Cyber Incidents ; Chapter 3: Fundamentals of Digital Forensics -- Section 2. Evidence Acquisition. Chapter 4: Collecting Network Evidence ; Chapter 5: Acquiring Host-Based Evidence ; Chapter 6: Forensic Imaging -- Section 3. Analyzing Evidence. Chapter 7: Analyzing Network Evidence ; Chapter 8: Analyzing System Memory ; Chapter 9: Analyzing System Storage ; Chapter 10: Analyzing Log Files ; Chapter 11: Writing the Incident Report -- Section 4. Specialist Topics. Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats. | |
650 | 0 | |a Digital forensic science. |0 http://id.loc.gov/authorities/subjects/sh2018000110 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 0 | |a Forensic sciences |x Data processing. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 6 | |a Criminalistique |x Informatique. | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Digital forensic science |2 fast | |
650 | 7 | |a Forensic sciences |x Data processing |2 fast | |
758 | |i has work: |a Digital Forensics and Incident Response (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3Wj4BCCFh7kyVy7ckJT6q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Johansen, Gerard. |t Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition. |d Birmingham : Packt Publishing, Limited, ©2020 |z 9781838649005 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2363873 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6033287 | ||
938 | |a EBSCOhost |b EBSC |n 2363873 | ||
938 | |a YBP Library Services |b YANK |n 301085562 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1139256488 |
---|---|
_version_ | 1816882510492073984 |
adam_text | |
any_adam_object | |
author | Johansen, Gerard |
author_facet | Johansen, Gerard |
author_role | aut |
author_sort | Johansen, Gerard |
author_variant | g j gj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8079 |
callnumber-raw | HV8079.C65 J64 2020 HV8073 |
callnumber-search | HV8079.C65 J64 2020 HV8073 |
callnumber-sort | HV 48079 C65 J64 42020 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Section 1. Foundations of Incident Response and Digital Forensics. Chapter 1: Understanding Incident Response ; Chapter 2: Managing Cyber Incidents ; Chapter 3: Fundamentals of Digital Forensics -- Section 2. Evidence Acquisition. Chapter 4: Collecting Network Evidence ; Chapter 5: Acquiring Host-Based Evidence ; Chapter 6: Forensic Imaging -- Section 3. Analyzing Evidence. Chapter 7: Analyzing Network Evidence ; Chapter 8: Analyzing System Memory ; Chapter 9: Analyzing System Storage ; Chapter 10: Analyzing Log Files ; Chapter 11: Writing the Incident Report -- Section 4. Specialist Topics. Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats. |
ctrlnum | (OCoLC)1139256488 |
dewey-full | 363.25/2 363.25 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/2 363.25 |
dewey-search | 363.25/2 363.25 |
dewey-sort | 3363.25 12 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04126cam a2200649 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1139256488</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">200207s2020 enk ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXIT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VT2</subfield><subfield code="d">UKMGB</subfield><subfield code="d">UMI</subfield><subfield code="d">AJB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC067183</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019712554</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1139923657</subfield><subfield code="a">1153053617</subfield><subfield code="a">1174318332</subfield><subfield code="a">1176246153</subfield><subfield code="a">1181794228</subfield><subfield code="a">1192347998</subfield><subfield code="a">1240522396</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838644086</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838644083</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838649005</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">183864900X</subfield><subfield code="q">(Trade Paper)</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781838649005</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1139256488</subfield><subfield code="z">(OCoLC)1139923657</subfield><subfield code="z">(OCoLC)1153053617</subfield><subfield code="z">(OCoLC)1174318332</subfield><subfield code="z">(OCoLC)1176246153</subfield><subfield code="z">(OCoLC)1181794228</subfield><subfield code="z">(OCoLC)1192347998</subfield><subfield code="z">(OCoLC)1240522396</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">B14066</subfield><subfield code="b">01201872</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8079.C65</subfield><subfield code="b">J64 2020</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8073</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.25</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johansen, Gerard,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital forensics and incident response :</subfield><subfield code="b">incident response techniques and procedures to respond to modern cyber threats /</subfield><subfield code="c">Gerard Johansen.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing Ltd.,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on April 15, 2020).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Foundations of Incident Response and Digital Forensics. Chapter 1: Understanding Incident Response ; Chapter 2: Managing Cyber Incidents ; Chapter 3: Fundamentals of Digital Forensics -- Section 2. Evidence Acquisition. Chapter 4: Collecting Network Evidence ; Chapter 5: Acquiring Host-Based Evidence ; Chapter 6: Forensic Imaging -- Section 3. Analyzing Evidence. Chapter 7: Analyzing Network Evidence ; Chapter 8: Analyzing System Memory ; Chapter 9: Analyzing System Storage ; Chapter 10: Analyzing Log Files ; Chapter 11: Writing the Incident Report -- Section 4. Specialist Topics. Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital forensic science.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2018000110</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Forensic sciences</subfield><subfield code="x">Data processing.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalistique</subfield><subfield code="x">Informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Digital forensic science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Forensic sciences</subfield><subfield code="x">Data processing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Digital Forensics and Incident Response (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3Wj4BCCFh7kyVy7ckJT6q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Johansen, Gerard.</subfield><subfield code="t">Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2020</subfield><subfield code="z">9781838649005</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2363873</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6033287</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2363873</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301085562</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1139256488 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:46Z |
institution | BVB |
isbn | 9781838644086 1838644083 9781838649005 183864900X |
language | English |
oclc_num | 1139256488 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing Ltd., |
record_format | marc |
spelling | Johansen, Gerard, author. Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / Gerard Johansen. Second edition. Birmingham : Packt Publishing Ltd., 2020. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Online resource; title from digital title page (viewed on April 15, 2020). An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities. Section 1. Foundations of Incident Response and Digital Forensics. Chapter 1: Understanding Incident Response ; Chapter 2: Managing Cyber Incidents ; Chapter 3: Fundamentals of Digital Forensics -- Section 2. Evidence Acquisition. Chapter 4: Collecting Network Evidence ; Chapter 5: Acquiring Host-Based Evidence ; Chapter 6: Forensic Imaging -- Section 3. Analyzing Evidence. Chapter 7: Analyzing Network Evidence ; Chapter 8: Analyzing System Memory ; Chapter 9: Analyzing System Storage ; Chapter 10: Analyzing Log Files ; Chapter 11: Writing the Incident Report -- Section 4. Specialist Topics. Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats. Digital forensic science. http://id.loc.gov/authorities/subjects/sh2018000110 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Forensic sciences Data processing. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Enquêtes. Criminalistique Informatique. Computer crimes Investigation fast Computer networks Security measures fast Digital forensic science fast Forensic sciences Data processing fast has work: Digital Forensics and Incident Response (Text) https://id.oclc.org/worldcat/entity/E39PD3Wj4BCCFh7kyVy7ckJT6q https://id.oclc.org/worldcat/ontology/hasWork Print version: Johansen, Gerard. Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition. Birmingham : Packt Publishing, Limited, ©2020 9781838649005 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2363873 Volltext |
spellingShingle | Johansen, Gerard Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / Section 1. Foundations of Incident Response and Digital Forensics. Chapter 1: Understanding Incident Response ; Chapter 2: Managing Cyber Incidents ; Chapter 3: Fundamentals of Digital Forensics -- Section 2. Evidence Acquisition. Chapter 4: Collecting Network Evidence ; Chapter 5: Acquiring Host-Based Evidence ; Chapter 6: Forensic Imaging -- Section 3. Analyzing Evidence. Chapter 7: Analyzing Network Evidence ; Chapter 8: Analyzing System Memory ; Chapter 9: Analyzing System Storage ; Chapter 10: Analyzing Log Files ; Chapter 11: Writing the Incident Report -- Section 4. Specialist Topics. Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats. Digital forensic science. http://id.loc.gov/authorities/subjects/sh2018000110 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Forensic sciences Data processing. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Enquêtes. Criminalistique Informatique. Computer crimes Investigation fast Computer networks Security measures fast Digital forensic science fast Forensic sciences Data processing fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2018000110 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85029493 |
title | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / |
title_auth | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / |
title_exact_search | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / |
title_full | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / Gerard Johansen. |
title_fullStr | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / Gerard Johansen. |
title_full_unstemmed | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats / Gerard Johansen. |
title_short | Digital forensics and incident response : |
title_sort | digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats |
title_sub | incident response techniques and procedures to respond to modern cyber threats / |
topic | Digital forensic science. http://id.loc.gov/authorities/subjects/sh2018000110 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Forensic sciences Data processing. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Enquêtes. Criminalistique Informatique. Computer crimes Investigation fast Computer networks Security measures fast Digital forensic science fast Forensic sciences Data processing fast |
topic_facet | Digital forensic science. Computer networks Security measures. Computer crimes Investigation. Forensic sciences Data processing. Réseaux d'ordinateurs Sécurité Mesures. Criminalité informatique Enquêtes. Criminalistique Informatique. Computer crimes Investigation Computer networks Security measures Digital forensic science Forensic sciences Data processing |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2363873 |
work_keys_str_mv | AT johansengerard digitalforensicsandincidentresponseincidentresponsetechniquesandprocedurestorespondtomoderncyberthreats |