Skip to main content

Humanities, Social Science and Language


Digital Products


Connect®
Course managementreporting, and student learning tools backed by great support.

McGraw Hill GO
Greenlight learning with the new eBook+

ALEKS®
Personalize learning and assessment

ALEKS® Placement, Preparation, and Learning
Achieve accurate math placement

SIMnet
Ignite mastery of MS Office and IT skills

McGraw Hill eBook & ReadAnywhere App
Get learning that fits anytime, anywhere

Sharpen: Study App
A reliable study app for students

Virtual Labs
Flexible, realistic science simulations

Services


Inclusive Access
Reduce costs and increase success

LMS Integration
Log in and sync up

Math Placement
Achieve accurate math placement

Content Collections powered by Create®
Curate and deliver your ideal content

Custom Courseware Solutions
Teach your course your way

Professional Services
Collaborate to optimize outcomes

Remote Proctoring
Validate online exams even offsite

Institutional Solutions
Increase engagement, lower costs, and improve access for your students

Support


General Help & Support Info
Customer Service & Tech Support contact information

Online Technical Support Center
FAQs, articles, chat, email or phone support

Support At Every Step
Instructor tools, training and resources for ALEKS, Connect & SIMnet

Instructor Sample Requests
Get step by step instructions for requesting an evaluation, exam, or desk copy

Platform System Check
System status in real time

Incident Response & Computer Forensics, Third Edition
Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition, 3rd Edition

ISBN10: 0071798684 | ISBN13: 9780071798686
By Jason Luttgens, Matthew Pepe and Kevin Mandia
© 2014

Format Options:

* The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.

Instructor Information

Quick Actions (Only for Validated Instructor Accounts):

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans

Part 1 PREPARING FOR THE INEVITABLE INCIDENT
1 Real World Incidents
2 IR Management Handbook
3 Pre-Incident Preparation

Part 2 INCIDENT DETECTION AND CHARACTERIZATION
4 Getting the Investigation Started
5 Initial Development of Leads
6 Discovering the Scope of the Incident

Part 3 DATA COLLECTION
7 Live Data Collection
8 Forensic Duplication
9 Network Evidence
10 Enterprise Services

Part 4 DATA ANALYSIS
11 Analysis Methodology
12 Investigating Windows Systems
13 Investigating MacOS Systems
14 Investigating Applications
15 Malware Triage
16 Report Writing

Part 5 REMEDIATION
17 Remediation Introduction
18 Remediation Case Studies

Part 6 APPENDICES
App A Answers to Questions
App B Incident Response Forms

About the Author

Jason Luttgens

Matthew Pepe

Kevin Mandia

Kevin Mandia Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime.

Need support?   We're here to help - Get real-world support and resources every step of the way.