Inicio > > Seguridad informática > Privacidad y protección de datos > Digital Forensics and Incident Response - Second Edition
Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen

83,41 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2020
Materia
Privacidad y protección de datos
ISBN:
9781838649005
83,41 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Perelló (Valencia)
  • Librería Aciertas (Toledo)
  • El AlmaZen del Alquimista (Sevilla)
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Donde los libros
  • Librería Proteo (Málaga)

Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for effective incident response- Explore real-life scenarios that effectively use threat intelligence and modeling techniquesBook Description:An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response.After focusing on the fundamentals of incident response that are critical to any information security team, you’ll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You’ll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you’ll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization.What You Will Learn:- Create and deploy an incident response capability within your own organization- Perform proper evidence acquisition and handling- Analyze the evidence collected and determine the root cause of a security incident- Become well-versed with memory and log analysis- Integrate digital forensic techniques and procedures into the overall incident response process- Understand the different techniques for threat hunting- Write effective incident reports that document the key findings of your analysisWho this book is for:This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.Table of Contents- Understanding Incident Response- Managing Cyber Incidents- Fundamentals of Digital Forensics- Collecting Network Evidence- Acquiring Host-Based Evidence- Forensic Imaging- Analyzing Network Evidence- Analyzing System Memory- Analyzing System Storage- Analyzing Log Files- Writing the Incident Report- Malware Analysis for Incident Response- Leveraging Threat Intelligence- Hunting for Threats- Appendix

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Cybercrime
    Denise M. Chatam / Denise MChatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. ...
    Disponible

    14,40 €

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...

Otros libros del autor