000 02098nam a2200241Ia 4500
003 NULRC
005 20250520103029.0
008 250520s9999 xx 000 0 und d
020 _a9781838649005
040 _cNULRC
050 _aHV 6773 .J64 2020
100 _aJohansen, Gerard
_eauthor
245 0 _aDigital forensics and incident response :
_bincident response tools and techniques for effective cyber threat response /
_cGerard Johansen
250 _aSecond Edition.
260 _aBirmingham, UK :
_bPackt Publishing, Limited,
_cc2020
300 _avii, 433 pages :
_billustrations ;
_c24 cm.
365 _bUSD50
504 _aIncludes index.
505 _aUnderstanding Incident Response -- Managing Cyber Incidents -- Fundamentals of Digital Forensics -- Collecting Network Evidence -- Acquiring Host-Based Evidence -- Forensic Imaging -- Analyzing Network Evidence -- Analyzing System Memory -- Analyzing System Storage -- Analyzing Log Files -- Writing the Incident Report -- Malware Analysis for Incident Response -- Leveraging Threat Intelligence -- Hunting for Threats -- Appendix.
520 _aAfter focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.
650 _aCOMPUTER CRIMES -- INVESTIGATION
942 _2lcc
_cBK
999 _c21776
_d21776