Paperback: 624 pages
Publisher: McGraw-Hill Education; 3 edition (August 4, 2014)
Product Dimensions: 7.4 x 1.4 x 9.1 inches
Shipping Weight: 2.3 pounds (View shipping rates and policies)
Average Customer Review: 4.5 out of 5 stars See all reviews (17 customer reviews)
Best Sellers Rank: #243,015 in Books (See Top 100 in Books) #154 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety #209 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #274 in Books > Textbooks > Computer Science > Networking
I would like to add the following comments - I personally know two of the authors and the technical editor for over 15 years. I have edition one and two and recently purchased edition three.I not only recommend the read for security professionals - I recommend the read for CXOs of companies and senior management in the Federal, State, Local governments - and of course the Military.Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -Spend sometime reading and understanding the Foreword section - written by Jamie, another expert in the area. He sets the tone for a valuable education trip.There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book.Lastly in Chapter 18 they "set the Strategic Direction" - They list 10 recommendations - Follow them if you want to keep your system as safe as possible with today's technology.Kudos go to the authors and the people who supported them throughout their professional careers.
Very well written and organized book. I throughly enjoyed reading this book (half way through)
The first 6 chapters are a bit repetitive, but after that's been seared into your memory it becomes a great guid. When you've finished it's nice to keep around for referencing.
This is an excellent book for all classes of incident responders. The concepts are easy to follow and it provides references to the appropriate tools for the job.
This book takes you through setup, organization, structure, where and how, case studies, plus provides rationale on why! Thumbs up!
Great read on IR topic. Finding lots of valuable content
good book. highly recommend :)
Great read, very informative.
Incident Response & Computer Forensics, Third Edition Real Digital Forensics: Computer Security and Incident Response Beyond Initial Response--2Nd Edition: Using The National Incident Management System Incident Command System The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk The Practice of Network Security Monitoring: Understanding Incident Detection and Response Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Third Eye: Awakening Your Third Eye Chakra: Beginner's Guide (Third Eye, Third Eye Chakra, Third Eye Awakening, Chakras) Third Eye: Third Eye Activation Secrets (Third Eye Awakening, Pineal Gland, Third Eye Chakra, Open Third Eye) HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition (The Morgan Kaufmann Series in Computer Architecture and Design) Host Response to Biomaterials: The Impact of Host Response on Biomaterial Selection Scene of the Cybercrime: Computer Forensics Handbook Computer Forensics JumpStart Computer Forensics: Cybercriminals, Laws, And Evidence Computer Forensics: Investigating Network Intrusions and Cyber Crime (EC-Council Press) Guide to Computer Forensics and Investigations (with DVD) LM Guide to Computer Forensics & Investigations Guide to Computer Forensics and Investigations Guide to Computer Forensics and Investigations (Book & CD)