Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Executing Windows Command Line Investigations, Hosmer, Chet


Варианты приобретения
Цена: 8083.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Hosmer, Chet
Название:  Executing Windows Command Line Investigations
ISBN: 9780128092682
Издательство: Elsevier Science
Классификация:


ISBN-10: 0128092688
Обложка/Формат: Paperback
Страницы: 200
Вес: 0.50 кг.
Дата издания: 14.06.2016
Язык: English
Размер: 193 x 235 x 15
Читательская аудитория: Professional & vocational
Подзаголовок: While ensuring evidentiary integrity
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание:

Executing Windows Command Line Investigations targets cyber security practitioners that focus on digital forensics and incident response. These are the individuals that are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations.

The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
Includes free download of Proactive Incident Response Command Shell (PIRCS) software Learn about the technical details of Windows CLI so you can directly manage every aspect of incident response evidence acquisition and triage, while maintaining evidentiary integrity.



Data Breach Response and Investigations

Автор: Kevvie Fowler
Название: Data Breach Response and Investigations
ISBN: 0128034513 ISBN-13(EAN): 9780128034514
Издательство: Elsevier Science
Рейтинг:
Цена: 8588.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: "

Data Breach Preparation and Response: Breaches are Certain, Impact is Not" is the first book to provide holistic and detailed guidance on managing a data breach, from preparing for a breach, through proactive breach detection, to restoring trust after a breach. Author and speaker Kevvie Fowler is a recognized thought leader and pioneer in the field of database forensics, and has led teams in the security assessment, incident response, and forensic investigation of complex infrastructures within corporate, data center, third party, and SCADA environments.

Kevvie has assembled a team of noted experts in the field, who show readers everything they need to know about detecting, scoping, containing, and responding to a data breach, including tactics on how to proactively prepare for a breach, an exercise that has been proven to significantly reduce the impact to an organization by 23 percent. The book gives readers the collective expertise of a team of recognized forensics, security, privacy, legal, and public relations experts with the real world experience to create the definitive breach management reference, an invaluable guide to a wide range of information security professionals, as well as those in business management who need to understand the critical issues involved.
Covers all the steps you can take to proactively prepare for a data breach, including assembling a breach response team, adhering to legal and regulatory requirements, and breach response training and awarenessPresents the technical details of identifying a data breach, including proactive forensics, intelligence monitoring, invoking a breach response process, and confirming a suspected breachProvides everything readers need to know about managing breach notification and investigating a suspected breach, including both internal and external communication, organizational management, and critical first responder stepsIncludes both technical and business management issues, and is the only book to provide this level of detail and expertise on dealing with a data breach


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия