<i>Computer Incident Response and Forensics Team Management</i> provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful
Computer Incident Response and Forensics Team Management
โ Scribed by Johnson, Leighton
- Publisher
- Syngress Publishing
- Year
- 2013
- Tongue
- English
- Leaves
- 349
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Computer Incident Response and Forensics Team Managementprovides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
โฆ Table of Contents
Instant messaging Applications
Introduction
AOL Instant Messanger
Yahoo! messanger
MSN Messanger
ICQ
Trillian, Google Talk, and Web-based Clients
Skype
Part II: Peer to Peer Networks
Introduction
Gnutella Architecture
eDonkey and eMule
BitTorrent
FastTrack
part III: Internet Chat Relays
IRC Networks and Security
Global IRC Security
Common IRC Clients by OS
Index.
๐ SIMILAR VOLUMES
<i>Computer Incident Response and Forensics Team Management</i> provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful
<i>Computer Incident Response and Forensics Team Management</i> provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful