Digital forensics and incident response : (Record no. 21776)

MARC details
000 -LEADER
fixed length control field 02098nam a2200241Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103029.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781838649005
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV 6773 .J64 2020
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Johansen, Gerard
Relator term author
245 #0 - TITLE STATEMENT
Title Digital forensics and incident response :
Remainder of title incident response tools and techniques for effective cyber threat response /
Statement of responsibility, etc. Gerard Johansen
250 ## - EDITION STATEMENT
Edition statement Second Edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham, UK :
Name of publisher, distributor, etc. Packt Publishing, Limited,
Date of publication, distribution, etc. c2020
300 ## - PHYSICAL DESCRIPTION
Extent vii, 433 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD50
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Understanding Incident Response -- Managing Cyber Incidents -- Fundamentals of Digital Forensics -- Collecting Network Evidence -- Acquiring Host-Based Evidence -- Forensic Imaging -- Analyzing Network Evidence -- Analyzing System Memory -- Analyzing System Storage -- Analyzing Log Files -- Writing the Incident Report -- Malware Analysis for Incident Response -- Leveraging Threat Intelligence -- Hunting for Threats -- Appendix.
520 ## - SUMMARY, ETC.
Summary, etc. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER CRIMES -- INVESTIGATION
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Digital Forensic LRC - Main National University - Manila General Circulation 05/07/2024 Purchased - Amazon 50.00   GC HV 6773 .J64 2020 NULIB000019535 05/20/2025 c.1 05/20/2025 Books