MARC details
000 -LEADER |
fixed length control field |
04893cam a2200469 i 4500 |
001 - CONTROL NUMBER |
control field |
22341798 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
USANT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250620094324.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m |o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240619s2014 nyua o 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2020753172 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071798693 |
Qualifying information |
ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9780071798686 |
Qualifying information |
pbk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
0071798684 |
Qualifying information |
pbk. |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
USANT |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
USANT |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV8079.C65 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition information |
23 |
Item number |
L96 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Pepe, Matthew, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Incident response & computer forensics / |
Statement of responsibility, etc. |
Jason T. Luttgens, Matthew Pepe. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
McGraw-Hill Education, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 601 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Previous edition: 2003. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response and Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting today's most common types of incidents. Specific, detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics. Special features highlight important tips for security practitioners: the Law Enforcement feature that appears throughout all chapters provides advice on when and how law enforcement must be informed; the What Can Happen feature shows how badly certain scenarios could turn out (with non-action or wrong-action) and why; the Where to Look feature guides you through the fastest routes to key evidence; and the Eye Witness feature details relevant real-world cases for context and urgency. Part I: Introduction to Incident Response covers real-world incidents, an introduction to the incident response process, preparation for incident response, and what happens after the detection of an incident. Part II: Data Collection covers live data collection from Windows and UNIX systems, forensic duplication, collecting network-based evidence, and evidence handling. Part III: Data Analysis covers computer system storage fundamentals, data analysis techniques, investigating Windows and UNIX systems, analyzing network traffic, investigating hacker tools, investigating routers, and writing computer forensic reports. The most technically rigorous handbook on incident handling available All-new advice on architecting networks from the ground-up to fight intrusions New details on streamlining intrusion diagnoses for faster recovery New coverage of: log file and massive data analysis; memory analysis; social media portals to entry; malware analysis; and mobile device-originated breaches New real-world scenarios added throughout exemplify the latest, most prevalent incident types New and up-to-date methods for investigating and assessing hackers' latest tools A forensics-forward approach to handling and protecting sensitive data without further compromising systems. -- Provided by publisher. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Description based on print version record and CIP data provided by publisher; resource not viewed. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Investigation. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Investigation. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00872065 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
Source of heading or term |
fast |
Authority record control number or standard number |
(OCoLC)fst00872484 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Luttgens, Jason T., |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kazanciyan, Ryan, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mandia, Kevin, |
Relator term |
author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
Title |
Incident response & computer forensics |
Place, publisher, and date of publication |
New York : McGraw-Hill Education, [2014] |
International Standard Book Number |
9780071798686 (pbk.) |
Record control number |
(DLC) 2015460939 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |
Classification part |
005.8 |
Item part |
L96 |
Call number prefix |
CIR |
Call number suffix |
2014 |
Suppress in OPAC |
No |