Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.
"synopsis" may belong to another edition of this title.
A strong system of defenses will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has occurred or is underway--they're often hard to spot--and show you what to do about it. Authors Kevin Mandia and Chris Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing with newly emerging attack techniques.
Anti-attack procedures are presented with the goal of identifying, apprehending, and successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described so as to inspire creative applications. Information on bad-guy behavior is top quality as well, giving readers knowledge of how to interpret logs and other observed phenomena. Mandia and Prosise don't--and can't--offer a foolproof guide to catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. --David Wall
Topics covered: Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.From the Back Cover:
Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in responding to computer security events." --Marc J. Zwillinger, former trial attorney with the U.S. Dept. of Justice, Computer Crime & Intellectual Property
"An excellent resource for information on how to respond to computer intrusions and conduct forensic investigations." --Network Magazine
"If your job requires you to review the contents of a computer system for evidence of unauthorized or unlawful activities, this is the book for you. The authors, through real-world experiences, demonstrate both technically and procedurally the right way to perform computer forensics and respond to security incidents." --Howard A. Schmidt, Former Special Advisor for Cyber Security, White House, and former Chief Security Officer, Microsoft Corp.
New and Updated Material:
Foreword by former FBI Special Agent Scott Larson
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill/Osborne, 2003. Paperback. Book Condition: New. book. Bookseller Inventory # 007222696X
Book Description McGraw-Hill/Osborne. PAPERBACK. Book Condition: New. 007222696X New Condition. Bookseller Inventory # NEW6.0927393
Book Description McGraw-Hill/Osborne, 2003. Paperback. Book Condition: New. Bookseller Inventory # P11007222696X
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: Brand New. 2nd sub edition. 650 pages. 9.00x7.50x1.25 inches. In Stock. Bookseller Inventory # __007222696X