Download Incident Response and Computer Forensics 2nd edition (.PDF)

Incident Response and Computer Forensics 2nd edition by Kevin Mandia, Chris Prosise & Matt Pepe
Requirements: PDF Reader, 15328 KB
Overview: A strong system of defenses will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has occurred or is underway–they’re often hard to spot–and show you what to do about it. Authors Kevin Mandia and Chris Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing with newly emerging attack techniques. This new edition contains six new chapters covering evidence handling, physical and data analysis, reporting, documentation and data recovery. Huge potential market, interest in this topic is growing rapidly according to Foundstone, a top security firm affiliated with the authors of the international best-seller Hacking Exposed . Written by experts, the authors provide an FBI insider’s look at the legal, procedural, and technical steps involved in responding to computer crime. Packed with case studies and practical advice, plus a companion Web site with real cases and sample log files for the reader to solve.
Image

Part 1: Introduction
Ch. 1 : Real World Incidents
Ch. 2 : Introduction to the Incident Response Process
Ch. 3 : Preparing for Incident Response
Ch. 4 : After Detection of an Incident

Part 2 : Data Collection
Ch. 5 : Live Data Collection From Windows Systems
Ch. 6 : Live Data Collection from Unix Systems
Ch. 7 : Forensic Duplication
Ch. 8 : Collecting Network-based Evidence
Ch. 9 : Evidence Handling

Part 3 : Data Analysis
Ch. 10 : Computer System Storage Fundamentals
Ch. 11 : Data Analysis Techniques
Ch. 12 : Investigating Windows Systems
Ch. 13 : Investigating Unix Systems
Ch. 14 : Analyzing Network Traffic
Ch. 15 : Investigating Hacker Tools
Ch. 16 : Investigating Routers
Ch. 17 : Writing Computer Forensic Report

Part 4 : Appendixes

Download Instructions:
http://rapidshare.com/files/145415780/I … dition.rar




Leave a Reply