Computer incident response and forensics team management : conducting a successful incident response / Leighton R. Johnson, III ; Mike Kessler, technical editor.
Material type: TextPublisher: Amsterdam ; Boston : Elsevier, Syngress, [2014]Description: xiii, 334 pages ; 24 cmContent type:- text
- unmediated
- volume
- 9781597499965 (alk. paper)
- 658.4/78 23
- HV8079.C65 J637 2014
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Kwara State University Library | HV8079.C65 .J63 2014 (Browse shelf(Opens below)) | Available | 016061-01 | ||
Books | Kwara State University Library | HV8079.C65 .J63 2014 (Browse shelf(Opens below)) | Available | 016061-02 | ||
Books | Kwara State University Library | HV8079.C65 .J63 2014 (Browse shelf(Opens below)) | Available | 016061-03 |
Browsing Kwara State University Library shelves Close shelf browser (Hides shelf browser)
HV8079.C65 .A37 2014 Cyber crime and cyber terrorism investigator's handbook / | HV8079.C65 .A37 2014 Cyber crime and cyber terrorism investigator's handbook / | HV8079.C65 .A37 2014 Cyber crime and cyber terrorism investigator's handbook / | HV8079.C65 .J63 2014 Computer incident response and forensics team management : conducting a successful incident response / | HV8079.C65 .J63 2014 Computer incident response and forensics team management : conducting a successful incident response / | HV8079.C65 .J63 2014 Computer incident response and forensics team management : conducting a successful incident response / | HV8079.C65 .S43 2013 Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects / |
Includes bibliographical references and index.
Introduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion.
There are no comments on this title.