Digital forensics and incident response : incident response tools and techniques for effective cyber threat response / Gerard Johansen
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Main | National University - Manila | Digital Forensic | General Circulation | GC HV 6773 .J64 2020 (Browse shelf (Opens below)) | c.1 | Available | NULIB000019535 |
Browsing National University - Manila shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HV 6773 .C37 2011 c.1 Digital evidence and computer crime : forensic science, computers and the internet / | GC HV 6773 .C37 2011 c.2 Digital evidence and computer crime : forensic science, computers and the internet / | GC HV 6773 .G73 2011 Cybercrime and espionage : an analysis of subversive multivector threats / | GC HV 6773 .J64 2020 Digital forensics and incident response : incident response tools and techniques for effective cyber threat response / | GC HV 6773 .S74 2014 c.1 Digital child pornography : a practical guide for investigators / | GC HV 6773 .S74 2014 c.2 Digital child pornography : a practical guide for investigators / | GC HV 6773 .Y37 2013 Cybercrime and society / |
Includes index.
Understanding Incident Response -- Managing Cyber Incidents -- Fundamentals of Digital Forensics -- Collecting Network Evidence -- Acquiring Host-Based Evidence -- Forensic Imaging -- Analyzing Network Evidence -- Analyzing System Memory -- Analyzing System Storage -- Analyzing Log Files -- Writing the Incident Report -- Malware Analysis for Incident Response -- Leveraging Threat Intelligence -- Hunting for Threats -- Appendix.
After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.
There are no comments on this title.