Incident Response & Computer Forensics, 3/e(Paperback) (事件響應與電腦取證(第三版))
Jason T. Luttgens, Matthew Pepe, Kevin Mandia
- 出版商: McGraw-Hill Education
- 出版日期: 2014-08-04
- 定價: $2,180
- 售價: 8.0 折 $1,744
- 語言: 英文
- 頁數: 624
- 裝訂: Paperback
- ISBN: 0071798684
- ISBN-13: 9780071798686
-
相關分類:
資訊安全、資訊科學
立即出貨 (庫存=1)
買這商品的人也買了...
-
$2,600$2,470 -
$1,260Windows Forensic Analysis Toolkit : Advanced Analysis Techniques for Windows 7, 3/e (Paperback)
-
$1,880$1,786 -
$2,020$1,919 -
$719$683 -
$1,068$1,015 -
$500$395 -
$454黑客大曝光:工業控制系統安全 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions)
-
$352Nutanix 超融合基礎架構權威指南
-
$237網絡攻防技術與實戰 — 深入理解信息安全防護體系
-
$534$507 -
$806從0到1:CTFer 成長之路
-
$653企業網絡安全建設最佳實踐
-
$509內網滲透體系建設
-
$594$564 -
$403惡意代碼逆向分析基礎詳解
-
$954$906 -
$816ATT& CK 框架實踐指南, 2/e
-
$811ATT & CK 視角下的紅藍對抗實戰指南
-
$539$512 -
$352二進制安全基礎
-
$828$787 -
$354$336
相關主題
商品描述
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks.
- Architect an infrastructure that allows for methodical investigation and remediation
- Develop leads, identify indicators of compromise, and determine incident scope
- Collect and preserve live data
- Perform forensic duplication
- Analyze data from networks, enterprise services, and applications
- Investigate Windows and Mac OS X systems
- Perform malware triage
- Write detailed incident response reports
- Create and implement comprehensive remediation plans
商品描述(中文翻譯)
「事故應變與電腦取證」是一本經典指南,已經十年來首次更新!這本第三版經過全面修訂,涵蓋了最新和最有效的工具和技術,為您提供在數據洩露發生時將組織從困境中解救出來所需的信息。這本實用資源涵蓋了整個事故應變的生命周期,包括準備、數據收集、數據分析和修復。真實案例研究揭示了當今最隱蔽攻擊背後的方法和修復策略。
以下是本書的主要內容:
- 設計一個允許有系統調查和修復的基礎架構
- 發展線索,識別妥協指標,確定事故範圍
- 收集和保留實時數據
- 執行取證複製
- 分析來自網絡、企業服務和應用程序的數據
- 調查Windows和Mac OS X系統
- 執行惡意軟件分析
- 撰寫詳細的事故應變報告
- 創建和實施全面的修復計劃