Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Incident Response


1. 

Instant Traffic Analysis with Tshark How-to

Instant Traffic Analysis with Tshark How-to

By: Borja Merino;

Publisher: Packt Publishing

Publication Date: 24-APR-2013

Insert Date: 30-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Master the terminal-based version of Wireshark for dealing with network security incidents Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Terminal-based version of Wireshark for dealing with network security incidents Useful filters to quickly identify and limit network problems derived from malware and a variety of network attacks Decoding capabilities to investigate suspicious traffic and detect network anomalies In Detail Malware, DoS attacks, SQLi, and data exfiltration are some of the problems that many security...

2. 

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

By: N. K. McCarthy

Publisher: McGraw-Hill

Publication Date: 09-AUG-2012

Insert Date: 20-JUL-2012

Slots: 1.0

Table of Contents • Start Reading

Based on proven, rock-solid computer incident response plans The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book provides an overview of attack and breach types, strategies for assessing an organization, types of plans, and case examples. Tips for keeping data contained, reputations defended, and recognizing and handling the magnitude of any given threat are included. The Computer Incident Response Planning Handbook • Contains...

3. 

How to Survive a Data Breach: A Pocket Guide

How to Survive a Data Breach: A Pocket Guide

By: Stewart Mitchell

Publisher: IT Governance Ltd

Publication Date: 17-FEB-2009

Insert Date: 14-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with security experts, lawyers and software suppliers....

4. 

Effective Incident Response Team, The

Effective Incident Response Team, The

By: 

Publisher: Addison-Wesley Professional

Publication Date: 23-SEP-2003

Insert Date: 21-NOV-2003

Slots: 1.0

Table of Contents • Start Reading

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find...

5. 

Incident Response

Incident Response

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 01-AUG-2001

Insert Date: 26-SEP-2002

Slots: 1.0

Table of Contents • Start Reading

Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? Will you be able to tell whether an incident is an attack or a glitch in the system? Do you know how to assess the possible damage from an incident? Incident Response shows you how to answer questions like these and create a plan for exactly what to do before, during, and after an incident. The authors of Incident Response draw on years of experience developing and taking part in incident response teams at the highest levels of...

6. 

This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with all phases of incident response effectively ¿ spanning from pre-incident conditions and considerations to the end of an incident. Although technical considerations, (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted,...