Detalles MARC
000 -LEADER |
fixed length control field |
01771nam a2200253 i 4500 |
001 - CONTROL NUMBER |
control field |
C00087426c |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DO-SdBDB |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144909.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200218s20142014ny d fr 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071798686 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
043 ## - GEOGRAPHIC AREA CODE |
Geographic area code |
n-ny-us |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV 8079 .C65 |
Item number |
.L87 2014 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Luttgens, Jason T. |
245 00 - TITLE STATEMENT |
Title |
Incident response & computer forensics / |
Statement of responsibility, etc. |
Jason T. Luttgens, Matthew Pepe and Kevin Mandia. |
250 ## - EDITION STATEMENT |
Edition statement |
Third edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGra-Hill Education, |
Date of publication, distribution, etc. |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 601 páginas : |
Other physical details |
ilustraciones, gráficas a blanco y negro ; |
Dimensions |
23 cm. |
500 ## - GENERAL NOTE |
General note |
Material de apoyo de Seguridad Cibernética de la Información. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword, xv -- |
Title |
Acknowledgments, xvii -- |
-- |
Introduction, xix -- |
-- |
Part 1. Preparing for the inevitable incident -- |
-- |
1. Real world incidents, 3 -- |
-- |
2. IR Management handbook, 23 -- |
-- |
3. Pre-incident preparation, 45 -- |
-- |
Part II. Incident detection and characterization -- |
-- |
4. Getting the investigation started on the right foot, 81 -- |
-- |
5. Initial development of leads, 95 -- |
-- |
6. Discovering the scope of the incident, 117 -- |
-- |
Part III. Data collection -- |
-- |
7. Live data colleccion, 135 -- |
-- |
8. Forensic duplication, 165 -- |
-- |
9. Network evidence, 183 -- |
-- |
10. Enterprise services, 215 -- |
-- |
Part IV. Data analysis -- |
-- |
11. Analysis methodology, 253 -- |
-- |
12. Investigating windows systems, 271 -- |
-- |
13. Investigating Mac OS X Systems, 381 -- |
-- |
14. Investigating applications, 421 -- |
-- |
15. Malware triage, 465 -- |
-- |
16. Report writing, 499 -- |
-- |
Part V. Remediation -- |
-- |
17. Remediation introduction, 513 -- |
-- |
Remediation case study, 553 -- |
-- |
Index, 573. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Delito informático. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |