000 | 01837cam a2200337 i 4500 | ||
---|---|---|---|
001 | 17887356 | ||
003 | OSt | ||
005 | 20210930193121.0 | ||
008 | 130916s2013 ne b 001 0 eng | ||
010 | _a 2013035259 | ||
020 | _a9781597499965 (alk. paper) | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aHV8079.C65 _bJ637 2014 |
082 | 0 | 0 |
_a658.4/78 _223 |
100 | 1 | _aJohnson, Leighton. | |
245 | 1 | 0 |
_aComputer incident response and forensics team management : _bconducting a successful incident response / _cLeighton R. Johnson, III ; Mike Kessler, technical editor. |
264 | 1 |
_aAmsterdam ; _aBoston : _bElsevier, Syngress, _c[2014] |
|
300 |
_axiii, 334 pages ; _c24 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion. | |
650 | 0 |
_aComputer crimes _xInvestigation. |
|
650 | 0 | _aEvidence, Criminal. | |
650 | 0 | _aForensic sciences. | |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK |
||
999 |
_c3236 _d3236 |