Incident Response and Computer Forensics, Second Edition
来源:互联网 发布:智能电视怎么设置网络 编辑:程序博客网 时间:2024/05/02 02:58
Amazon.com A strong system of defenses will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has occurred or is underway--they're often hard to spot--and show you what to do about it. Authors Kevin Mandia and Chris Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing with newly emerging attack techniques. Anti-attack procedures are presented with the goal of identifying, apprehending, and successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described so as to inspire creative applications. Information on bad-guy behavior is top quality as well, giving readers knowledge of how to interpret logs and other observed phenomena. Mandia and Prosise don't--and can't--offer a foolproof guide to catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. --David Wall Topics covered: Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier. --This text refers to an out of print or unavailable edition of this title. Book Description Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks. # 507 pages # Publisher: McGraw-Hill/Osborne; 2 edition (July 17, 2003) # Language: English # ISBN-10: 007222696X # ISBN-13: 978-0072226966 http://rapidshare.com/files/88230990/Incisics_2nd_ed._W.pdf
- Incident Response and Computer Forensics, Second Edition
- Oracle Incident Response and Forensics.pdf 2017 英文原版 免费下载
- Windows Forensics and Incident Recovery
- Computer Science Handbook, Second Edition
- Mathematics for 3D Game Programming and Computer Graphics, Second Edition
- Computer Vision: A Modern Approach (Second Edition)
- Computer Vision: A Modern Approach (Second Edition)
- PHP Objects, Patterns, and Practice, Second Edition
- Computer Forensics-计算机法医学
- Principles of Network and System Administration , Second Edition
- 《Concurrent Programming in Java: Design Principles and Patterns》Second Edition
- Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
- Metrics and Models in Software Quality Engineering, Second Edition
- Unix Systems Programming: Communication, Concurrency and Threads, Second Edition
- Unix Systems Programming: Communication, Concurrency and Threads, Second Edition
- Software Testing and Continuous Quality Improvement, Second Edition
- Pro VB 2005 and the .NET 2.0 Platform, Second Edition
- Joe Celko's SQL Puzzles and Answers, Second Edition
- VxWorks BSP理解
- SEBank银行项目客户需求
- vxworks中断
- vxworksBSP设计
- SEBank银行项目实施说明
- Incident Response and Computer Forensics, Second Edition
- 《每日电讯报》评出10个最好用搜索网站
- SEBank银行项目文件编写规范
- SEBank银行项目第一个星期的进度安排
- Java事务处理总结
- Windows 系统背景:Windows 启动过程图详解
- 疯狂程序员
- Java中事务处理方法
- JAVA设计模式之事务处理