Image from Google Jackets

Incident response and computer forensics / Chris Prosise and Kevin Mandia.

By: Contributor(s): Material type: TextTextPublication details: Berkeley, Calif. ; London : Osborne, 2003.Edition: 2nd edDescription: 507 p. : ilISBN:
  • 007222696X
Subject(s): LOC classification:
  • HV6773  .P766 2003
Contents:
Real-world incidents -- Introduction to the incident response process -- Preparing for incident response -- After detection of an incident -- Live data collection from Windows systems -- Live data collection of Unix systems -- Forensic duplication -- Collecting network-based evidence -- Evidence handling -- Computer system storage fundamentals -- Data analysis techniques -- Investigating Windows systems -- Investigating Unix systems -- Analyzing network traffic -- Investigating hacker tools -- Investigating routers -- Writing computer forensic reports.
Summary: "An insider's look at the legal procedural and technical steps of computer forensics and analysis. Contains all-new forensics content and real-world scenarios."--Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books MAIN General AUE Library Collection HV6773 .P766 2003 (Browse shelf(Opens below)) 1 Available 10032141
Books Books MAIN General AUE Library Collection HV6773 .P766 2003 (Browse shelf(Opens below)) 2 Available 10032151
Books Books MAIN General AUE Library Collection HV6773 .P766 2003 (Browse shelf(Opens below)) 3 Available 10032161
Books Books MAIN General AUE Library Collection HV6773 .P766 2003 (Browse shelf(Opens below)) 4 Available 10032171

Real-world incidents -- Introduction to the incident response process -- Preparing for incident response -- After detection of an incident -- Live data collection from Windows systems -- Live data collection of Unix systems -- Forensic duplication -- Collecting network-based evidence -- Evidence handling -- Computer system storage fundamentals -- Data analysis techniques -- Investigating Windows systems -- Investigating Unix systems -- Analyzing network traffic -- Investigating hacker tools -- Investigating routers -- Writing computer forensic reports.

"An insider's look at the legal procedural and technical steps of computer forensics and analysis. Contains all-new forensics content and real-world scenarios."--Cover.

There are no comments on this title.

to post a comment.