Digital forensics and incident response : (Record no. 21776)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02098nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520103029.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781838649005 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV 6773 .J64 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Johansen, Gerard |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Digital forensics and incident response : |
Remainder of title | incident response tools and techniques for effective cyber threat response / |
Statement of responsibility, etc. | Gerard Johansen |
250 ## - EDITION STATEMENT | |
Edition statement | Second Edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Birmingham, UK : |
Name of publisher, distributor, etc. | Packt Publishing, Limited, |
Date of publication, distribution, etc. | c2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | vii, 433 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD50 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Understanding Incident Response -- Managing Cyber Incidents -- Fundamentals of Digital Forensics -- Collecting Network Evidence -- Acquiring Host-Based Evidence -- Forensic Imaging -- Analyzing Network Evidence -- Analyzing System Memory -- Analyzing System Storage -- Analyzing Log Files -- Writing the Incident Report -- Malware Analysis for Incident Response -- Leveraging Threat Intelligence -- Hunting for Threats -- Appendix. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER CRIMES -- INVESTIGATION |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Digital Forensic | LRC - Main | National University - Manila | General Circulation | 05/07/2024 | Purchased - Amazon | 50.00 | GC HV 6773 .J64 2020 | NULIB000019535 | 05/20/2025 | c.1 | 05/20/2025 | Books |