000 01837cam a2200337 i 4500
001 17887356
003 OSt
005 20210930193121.0
008 130916s2013 ne b 001 0 eng
010 _a 2013035259
020 _a9781597499965 (alk. paper)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aHV8079.C65
_bJ637 2014
082 0 0 _a658.4/78
_223
100 1 _aJohnson, Leighton.
245 1 0 _aComputer incident response and forensics team management :
_bconducting a successful incident response /
_cLeighton R. Johnson, III ; Mike Kessler, technical editor.
264 1 _aAmsterdam ;
_aBoston :
_bElsevier, Syngress,
_c[2014]
300 _axiii, 334 pages ;
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion.
650 0 _aComputer crimes
_xInvestigation.
650 0 _aEvidence, Criminal.
650 0 _aForensic sciences.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBK
999 _c3236
_d3236