usant

ONLINE PUBLIC ACCESS CATALOG 

Incident response & computer forensics / (Record no. 1198)

MARC details
000 -LEADER
fixed length control field 04893cam a2200469 i 4500
001 - CONTROL NUMBER
control field 22341798
003 - CONTROL NUMBER IDENTIFIER
control field USANT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250620094324.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m |o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240619s2014 nyua o 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2020753172
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071798693
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780071798686
Qualifying information pbk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0071798684
Qualifying information pbk.
040 ## - CATALOGING SOURCE
Original cataloging agency USANT
Language of cataloging eng
Description conventions rda
Transcribing agency USANT
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition information 23
Item number L96
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pepe, Matthew,
Relator term author.
245 10 - TITLE STATEMENT
Title Incident response & computer forensics /
Statement of responsibility, etc. Jason T. Luttgens, Matthew Pepe.
250 ## - EDITION STATEMENT
Edition statement Third edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer McGraw-Hill Education,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 601 pages :
Other physical details illustrations ;
Dimensions 23 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Previous edition: 2003.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms
520 ## - SUMMARY, ETC.
Summary, etc. The all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response and Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting today's most common types of incidents. Specific, detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics. Special features highlight important tips for security practitioners: the Law Enforcement feature that appears throughout all chapters provides advice on when and how law enforcement must be informed; the What Can Happen feature shows how badly certain scenarios could turn out (with non-action or wrong-action) and why; the Where to Look feature guides you through the fastest routes to key evidence; and the Eye Witness feature details relevant real-world cases for context and urgency. Part I: Introduction to Incident Response covers real-world incidents, an introduction to the incident response process, preparation for incident response, and what happens after the detection of an incident. Part II: Data Collection covers live data collection from Windows and UNIX systems, forensic duplication, collecting network-based evidence, and evidence handling. Part III: Data Analysis covers computer system storage fundamentals, data analysis techniques, investigating Windows and UNIX systems, analyzing network traffic, investigating hacker tools, investigating routers, and writing computer forensic reports. The most technically rigorous handbook on incident handling available All-new advice on architecting networks from the ground-up to fight intrusions New details on streamlining intrusion diagnoses for faster recovery New coverage of: log file and massive data analysis; memory analysis; social media portals to entry; malware analysis; and mobile device-originated breaches New real-world scenarios added throughout exemplify the latest, most prevalent incident types New and up-to-date methods for investigating and assessing hackers' latest tools A forensics-forward approach to handling and protecting sensitive data without further compromising systems. -- Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher; resource not viewed.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872065
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00872484
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Luttgens, Jason T.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kazanciyan, Ryan,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mandia, Kevin,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Incident response & computer forensics
Place, publisher, and date of publication New York : McGraw-Hill Education, [2014]
International Standard Book Number 9780071798686 (pbk.)
Record control number (DLC) 2015460939
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Classification part 005.8
Item part L96
Call number prefix CIR
Call number suffix 2014
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Circulation College Library College Library College Library 06/19/2024   CIR 005.8 L96 2014 62130 06/19/2024 1-1 06/19/2024 Book
  • Copyright © 2024 University of Saint Anthony | All rights reserved
  • Dr. Ortega St., San Miguel, Iriga City, 4431, Philippines
  • Tel. No. +63-54-205-1234
  • info@usant.edu.ph