Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

$23.08

Pickup available at Bookstore (Hours: Open Everyday, 8 am to 4 pm)

Usually ready in 24 hours


Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book Description An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is for This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book. Table of Contents Understanding Incident Response Managing Cyber Incidents Fundamentals of Digital Forensics Collecting Network Evidence Acquiring Host-Based Evidence Forensic Imaging Analyzing Network Evidence Analyzing System Memory Analyzing System Storage Analyzing Log Files Writing the Incident Report Malware Analysis for Incident Response Leveraging Threat Intelligence Hunting for Threats Appendix
ASIN: 183864900X
VSKU: DBV.183864900X.A
Condition: Acceptable
Author/Artist:Johansen, Gerard
Binding: Paperback
Note on Condition

Most of the items in our store are used. The item's condition grade is indicated near the bottom of the product description. If you have any questions regarding specific details of an item, please contact us. We use the following rating scale:

Books:

  • Used - Very Good: Item may have minor cosmetic defects (marks, wears, cuts, bends, crushes) on the cover, spine, pages or dust cover. Shrink wrap, dust covers, or boxed set case may be missing. Item may contain remainder marks on outside edges, which should be noted in listing comments. Item may be missing bundled media. 
  • Used - Good: All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. Gently used ex-library books with library stickers and markings may be classified as good. Shrink wrap, dust covers, or boxed set case may be missing. Item may be missing bundled media. 
  • Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may but the dust cover may be missing. Pages may include limited notes and highlighting, but the text cannot be obscured or unreadable.

CDs/DVDs/Discs:

  • Used - Good: Case may be damaged or come repackaged. Disc may have up to 1.5cm marking but is in great working condition. 
  • Used - Acceptable: A product with extensive external signs of wear, but is in great working condition. The case may be damaged. The cover art, liner, notes, or other inclusion may be marked, or one or all of these items may be missing.
Shipping & Returns

Shipping: Most orders are shipped within 2 business days.

Returns: We want you to be completely satisfied with your purchase. If you're not, you can return your order within 30 days of purchase for a refund.

Fast Shipping

Orders are typically processed and shipped within 2 days

Competitive Pricing

We've streamlined our processes to provide competitive prices on all our titles

Exceptional Customer Service

Our dedicated team is committed to providing outstanding customer support