Computer Incident Response and Forensics Team Management

Conducting a Successful Incident Response

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Computer Incident Response and Forensics Team Management by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780124047259
Publisher: Elsevier Science Publication: November 8, 2013
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780124047259
Publisher: Elsevier Science
Publication: November 8, 2013
Imprint: Syngress
Language: English

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

  • Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
  • Identify the key steps to completing a successful computer incident response investigation
  • Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

More books from Elsevier Science

Cover of the book Nanodiamonds by Leighton Johnson
Cover of the book Biophotonics for Medical Applications by Leighton Johnson
Cover of the book GFI Network Security and PCI Compliance Power Tools by Leighton Johnson
Cover of the book Fundamentals of Toxicologic Pathology by Leighton Johnson
Cover of the book Oil Spill Science and Technology by Leighton Johnson
Cover of the book Comparative Physiology of Thermoregulation by Leighton Johnson
Cover of the book Highlights in Helioclimatology by Leighton Johnson
Cover of the book Computer Design of Diffractive Optics by Leighton Johnson
Cover of the book Functionalised Cardiovascular Stents by Leighton Johnson
Cover of the book The Biodiesel Handbook by Leighton Johnson
Cover of the book A New Era of Catecholamines in the Laboratory and Clinic by Leighton Johnson
Cover of the book Principles of Nucleic Acid Structure by Leighton Johnson
Cover of the book Preparing for the New Era of Transport Policies: Learning from Experience by Leighton Johnson
Cover of the book The Psychological Journey To and From Loneliness by Leighton Johnson
Cover of the book Tribology for Engineers by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy