Incident Response: Investigating Computer Crime
McGraw-Hill Professional (Verlag)
978-0-07-213182-6 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime. Chris Prosise VP of Consulting at Foundstone, is a recognized network security expert with extensive experience in attack and penetration testing and incident response. Chris has led government and commercial security teams of missions worldwide, from sensitive incident response missions on Top Secret government networks to comprehensive security assessments on some of the worlds largest corporations. Chris is a featured speaker at multiple security conferences such as Forum of Incident Response and Security Teams (FIRST). He has written articles for SysAdmin and is the technical editor of Hacking Exposed.
Part I: Learning the Ropes. Chapter 1: Insiders and Outsiders: A Case Study. Chapter 2: Introduction to Incident Response. Chapter 3: Preparing for Incident Response. Part II: Putting on the Gloves. Chapter 4: Investigative Guidelines. Chapter 5: The Computer Forensic Process. Chapter 6: Learning Network Protocols and Performing a Trap and a Trace. Chapter 7: Performing Network Surveillance. Chapter 8: Advanced Network Surveillance. Part III: Getting in the Ring: Investigating Systems. Chapter 9: Initial Response to Windows NT/2000. Chapter 10: Investigating Windows NT/2000. Chapter 11: Initial Response to UNIX Systems. Chapter 12: Investigating UNIX. Part IV: Investigating Nonplatform-Specific Technology. Chapter 13: Investigating Routers. Chapter 14: Investigating Web Attacks. Chapter 15: Investigating Application Servers. Chapter 16: Investigating Hacker Tools. Part V: Appendices. A: Establishing Identity in Cyberspace. B: Information Security Policies and Acceptable Use Policies. C: Computer Crime Statutes. D: Response Organizations.
Erscheint lt. Verlag | 16.7.2001 |
---|---|
Zusatzinfo | 50 illustrations, appendices |
Sprache | englisch |
Maße | 185 x 229 mm |
Gewicht | 1100 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
ISBN-10 | 0-07-213182-9 / 0072131829 |
ISBN-13 | 978-0-07-213182-6 / 9780072131826 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich