Hot Best Seller

Incident Response & Computer Forensics

Availability: Ready to download

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle o The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans


Compare

The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle o The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

56 review for Incident Response & Computer Forensics

  1. 5 out of 5

    Jay

    I probably wasn’t reading this in the manner the authors intended, but I found it quite interesting and educational – it fit my purpose. Computer security is not my line, but I feel it is imperative for those managing information technology at companies to understand the current battleground of computer security, and to get a taste for the tactics used by the elusive hacker as well as the possible avenues of investigation and response. I would say this book provided an excellent intermediate lev I probably wasn’t reading this in the manner the authors intended, but I found it quite interesting and educational – it fit my purpose. Computer security is not my line, but I feel it is imperative for those managing information technology at companies to understand the current battleground of computer security, and to get a taste for the tactics used by the elusive hacker as well as the possible avenues of investigation and response. I would say this book provided an excellent intermediate level of information. Any more detailed and you are talking about an encyclopedia’s worth of text that changes on a very regular basis. Any less detail and you have something that can only be used as a generic roadmap, aimed at managers but not practitioners. Here, my manager mind got an excellent description of how many kinds of attacks work, how and where evidence can be found through investigation, and how to remediate the issue. In addition, my technical background, mostly back a generation or two in the technology, got an update on areas of interest, including the current state of Windows technology, like how file systems work, and on tools that help in an investigation, describing some of the differences between paid and free tools. One of the issues in a book like this is that it is written at a point in time, and things change. Vendors update products, hackers try new methods. The authors took an “intermediate” approach by describing a variety of tools and hacker methods, but providing pointers to websites for the reader to get up-to-date information. So although this version of the book was 3 years old, it still reads as if it is current and retains value. Worthwhile for an update on the state of affairs, and likely worthwhile for a practitioner beginning in the battle.

  2. 4 out of 5

    Takedown

    Written by Mandiant founders and experts - this book covers a full lifecycle of Incident Response including various non-technical considerations. Easy and concise to read, filled with tips and practical examples, this is the best fundamental IR material from the people who basically invent the field. As a bonus you get a unique glimpse into how Mandiant operate. What more do you need? This book would be useful for technical IR personnel in the trenches as well as management folks, especially peopl Written by Mandiant founders and experts - this book covers a full lifecycle of Incident Response including various non-technical considerations. Easy and concise to read, filled with tips and practical examples, this is the best fundamental IR material from the people who basically invent the field. As a bonus you get a unique glimpse into how Mandiant operate. What more do you need? This book would be useful for technical IR personnel in the trenches as well as management folks, especially people creating and leading CSIRT teams. Look no further if you want to know what Incident Response is all about!

  3. 5 out of 5

    Naci Can

    ı want read to this book

  4. 4 out of 5

    Tim

    Killed GCFA, so good enough

  5. 5 out of 5

    digvijay

  6. 4 out of 5

    M

  7. 5 out of 5

    Morris Ntonja

  8. 5 out of 5

    Tobias

  9. 5 out of 5

    Kevin

  10. 4 out of 5

    Alexander Guerette

  11. 5 out of 5

    Brandon

  12. 5 out of 5

    David Michael

  13. 4 out of 5

    Jim

  14. 4 out of 5

    Dudley Grant

  15. 5 out of 5

    Pradeep

  16. 4 out of 5

    Claudiu.Gherghinoiu

  17. 5 out of 5

    Douglas R. Wilson

  18. 5 out of 5

    A. W.L Frauenhauf

  19. 5 out of 5

    Patrik

  20. 5 out of 5

    D.B.

  21. 5 out of 5

    Elison Cepeda

  22. 5 out of 5

    Francisco Flores

  23. 5 out of 5

    Lauren

  24. 4 out of 5

    Ben Nelson

  25. 5 out of 5

    Belinda Villegas

  26. 4 out of 5

    Marco

  27. 5 out of 5

    Micah

  28. 4 out of 5

    William Stackpole

  29. 5 out of 5

    William Mantz

  30. 5 out of 5

    Aidan Walsh

  31. 5 out of 5

    Mrunal

  32. 4 out of 5

    Scott Roberts

  33. 4 out of 5

    Jinggruk Kario

  34. 5 out of 5

    Yasin

  35. 4 out of 5

    Jagdish Mohite

  36. 5 out of 5

    Asif Zaman

  37. 5 out of 5

    Vidyullata

  38. 4 out of 5

    Jan

  39. 4 out of 5

    Pulkit Biyani

  40. 4 out of 5

    Sapana Gautam

  41. 5 out of 5

    Angie Acosta

  42. 4 out of 5

    Dwight Customer

  43. 4 out of 5

    Mert SARICA

  44. 4 out of 5

    George Firlus

  45. 5 out of 5

    Devi

  46. 4 out of 5

    Ege

  47. 5 out of 5

    Nuri

  48. 5 out of 5

    Revelation Mensah

  49. 5 out of 5

    Morgan

  50. 4 out of 5

    Abdullah Özbay

  51. 5 out of 5

    Sasasa

  52. 5 out of 5

    Richard

  53. 4 out of 5

    SRINI

  54. 4 out of 5

    Lynxcode

  55. 5 out of 5

    Edgar Markevicius

  56. 5 out of 5

    Byron Espinoza

Add a review

Your email address will not be published. Required fields are marked *

Loading...