책 이미지

eBook 미리보기
책 정보
· 제목 : Incident Response & Computer Forensics (Paperback, 2nd, Subsequent) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780072226966
· 쪽수 : 650쪽
· 출판일 : 2003-06-01
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780072226966
· 쪽수 : 650쪽
· 출판일 : 2003-06-01
목차
Part I: Introduction
1: Real-World Incidents
2: Introduction to the Incident Response Process
3: Preparing for Incident Response
4: After Detection of an Incident
Part II: Data Collection
5: Live Data Collection from Windows Systems
6: Live Data Collection from Unix Systems
7: Forensic Duplication
8: Collecting Network-based Evidence
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
2: Introduction to the Incident Response Process
3: Preparing for Incident Response
4: After Detection of an Incident
Part II: Data Collection
5: Live Data Collection from Windows Systems
6: Live Data Collection from Unix Systems
7: Forensic Duplication
8: Collecting Network-based Evidence
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
4: After Detection of an Incident
Part II: Data Collection
5: Live Data Collection from Windows Systems
6: Live Data Collection from Unix Systems
7: Forensic Duplication
8: Collecting Network-based Evidence
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
5: Live Data Collection from Windows Systems
6: Live Data Collection from Unix Systems
7: Forensic Duplication
8: Collecting Network-based Evidence
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
7: Forensic Duplication
8: Collecting Network-based Evidence
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
9: Evidence Handling
Part III: Data Analysis
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
10: Computer System Storage Fundamentals
11: Data Analysis Techniques
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
12: Investigating Windows Systems
13: Investigating Unix Systems
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
14: Analyzing Network Traffic
15: Investigating Hacker Tools
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
16: Investigating Routers
17: Writing Computer Forensic Reports
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
Part IV: Appendixes
A: Answers to Questions
B: Incident Response Forms
B: Incident Response Forms
추천도서
분야의 베스트셀러 >