الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 9.99$ يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
Details page - Device banner - 894x1036

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

اللغة
اللغة الإنجليزية
Format
الفئة

كتب واقعية

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you’ll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You’ll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you’ll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization.

© 2020 Packt Publishing (كتاب ): 9781838644086

تاريخ الإصدار

كتاب : 29 يناير 2020

الوسوم

    واستمتع آخرون أيضًا...

    1. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    2. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    3. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    4. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    5. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    6. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    7. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    8. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    9. Cybersecurity For Dummies Joseph Steinberg
    10. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    11. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    12. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    13. Cybercrime Investigators Handbook Graeme Edwards
    14. Biggest Cyber Crimes in the History Introbooks Team
    15. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    16. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    17. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    18. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    19. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    20. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    21. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
    22. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    23. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
    24. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    25. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    26. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    27. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    28. The Art of Deception: Controlling the Human Element of Security William L. Simon
    29. Cyber Security for Decision Makers Jarno Limnéll
    30. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    31. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
    32. Cybersecutity First Principles Rick Howard
    33. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
    34. If It's Smart, It's Vulnerable Mikko Hypponen
    35. Cloud Security For Dummies Ted Coombs
    36. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
    37. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    38. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    39. Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Trust Genics
    40. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    41. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    42. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
    43. Blockchain For Dummies Tiana Laurence
    44. Data Science John D. Kelleher
    45. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    46. Schneier on Security Bruce Schneier
    47. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
    1. A Country Doctor Sarah Orne Jewett
      2.8
    2. PMP Pro: Transform Your Exam Success with Game-Changing Secrets: "Elevate your PMP exam results! Dive into transformative audio lessons for peak performance on test day." Arden Blakewood
    3. Summary - I’m Still Here: Based On The Book By Austin Channing Brown Library Of Stories
      1
    4. Desconexión Digital: Meditaciones Guiadas para Calma y Claridad Refeser
    5. Summary - Emotional Intelligence 2.0.: Based On The Book By Travis Bradberry And Jean Greaves Fastbooks Publishing
    6. Nature’s Symphony of Serene Forest Cricket Sounds Mixed With Piano Rhythms For Deep Calm & Relaxation: Experience Soothing Nights for Restful Sleep & Mindfulness Using Enhanced BGM 8D Audio Cedar Skye
    7. Summary - Freakonomics: Based On The Book By Steven Levitt And Stephen Dubner Fastbooks Publishing
      4
    8. Django Unchained - The Ultimate Trivia Collection: From The Movie Directed By Quentin Tarantino Film Trivia Metaverse
    9. 100 Quotes About Inner Peace That Will Transform Your Life: Finding Serenity Amidst Life's Turmoil The Quotes Library
    10. GED Secrets: Elevate Your Success and Conquer the Exam Today: "Boost your GED prep! Unlock engaging audio lessons for ultimate exam success today!" Ronan Cade
    11. Extended Summary - Maybe You Should Talk To Someone: Based On The Book By Lori Gottlieb Quick Reading Library
    12. Extended Summary - Braving The Wilderness: Based On The Book By Brene Brown Quick Reading Library
      2
    13. Summary - Eat To Live: Based On The Book By Dr. Joel Fuhrman Fastbooks Publishing
    14. Summary - 1620 - A Critical Response To The 1619 Project: Based On The Book By Peter W. Wood Library Of Stories
    15. Summary - Everything Is F*Cked: Based On The Book By Mark Manson Fastbooks Publishing

    دائمًا برفقة Storytel

    • أكثر من 200000 عنوان

    • وضع الأطفال (بيئة آمنة للأطفال)

    • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

    • الإلغاء في أي وقت

    الكتب الأكثر استماعًا

    شهري

    قصص لكل المناسبات.

    9.99 $ / شهر
    7 يومًا مجانًا
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    سنويا

    قصص لكل المناسبات.

    83.88 $ /سنة
    7 يومًا مجانًا
    وفر 30%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن

    6 أشهر

    قصص لكل المناسبات.

    53.64 $ /6 أشهر
    7 يومًا مجانًا
    وفر 11%
    • حساب واحد

    • حساب بلا حدود

    • 1 حساب

    • استماع بلا حدود

    • إلغاء في أي وقت

    جرب الآن