Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Incident Response: Investigating Computer Crime

Posted By: albert00

Incident Response: Investigating Computer Crime


Incident Response: Investigating Computer Crime
McGraw-Hill Companies | ISBN 0072131829 | 2001 Year | 512 Pages | PDF | English | 45.63 Mb



A strong system of defenses will save your systems from falling victim to published and otherwise uninventive attacks, but even the most heavily defended system can be cracked under the right conditions. Incident Response aims to teach you how to determine when an attack has occurred or is underway–they're often hard to spot–and show you what to do about it. Authors Kevin Mandia and Chris Prosise favor a tools- and procedures-centric approach to the subject, thereby distinguishing this book from others that catalog particular attacks and methods for dealing with each one. The approach is more generic, and therefore better suited to dealing with newly emerging attack techniques.
Anti-attack procedures are presented with the goal of identifying, apprehending, and successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described so as to inspire creative applications. Information on bad-guy behavior is top quality as well, giving readers knowledge of how to interpret logs and other observed phenomena. Mandia and Prosise don't–and can't–offer a foolproof guide to catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. –David Wall

Topics covered: Monitoring computer systems for evidence of malicious activity, and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack, and tools for making forensic work easier.

Book Description
This is one of the first books available that explains what to do after you've been hacked. Written by FBI insiders, this book reveals the computer forensics process and offers authoritative solutions designed to counteract and conquer hacker attacks.

Source: http://www.amazon.com/Incident-Response-Investigating-Computer-Crime/dp/0072131829

Download: http://rapidshare.de/files/36510834/iricc.rar


Password: www.AvaxHome.ru

Worth having:
cFosSpeed - Speed up your internet connection!
Xp VLK - No more WGA

See my other posts in the "myposts.html" file

albert00