did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Incident Response & Computer Forensics, Third Edition

9780071798686

Incident Response & Computer Forensics, Third Edition

  • ISBN 13:

    9780071798686

  • ISBN 10:

    0071798684

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 08/04/2014
  • Publisher: The McGraw-Hill Companies

List Price $62.00 Save

Rent $35.91
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $62.00 Save $15.02

Used $46.98

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

List Price $62.00 Save $2.16

New $59.84

Usually Ships in 3-4 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans

Supplemental Materials

Read more