Computer Incident Response and Forensics Team Management

Conducting a Successful Incident Response

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Computer Incident Response and Forensics Team Management by Leighton Johnson, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leighton Johnson ISBN: 9780124047259
Publisher: Elsevier Science Publication: November 8, 2013
Imprint: Syngress Language: English
Author: Leighton Johnson
ISBN: 9780124047259
Publisher: Elsevier Science
Publication: November 8, 2013
Imprint: Syngress
Language: English

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

  • Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
  • Identify the key steps to completing a successful computer incident response investigation
  • Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

More books from Elsevier Science

Cover of the book Handbook of Pesticide Toxicology by Leighton Johnson
Cover of the book Advances in Organometallic Chemistry by Leighton Johnson
Cover of the book Mathematics for Engineers and Technologists by Leighton Johnson
Cover of the book Overview of Industrial Process Automation by Leighton Johnson
Cover of the book Handbook of Spent Hydroprocessing Catalysts by Leighton Johnson
Cover of the book The Life-Cycle of Pharmaceuticals in the Environment by Leighton Johnson
Cover of the book Congenital and Acquired Bone Marrow Failure by Leighton Johnson
Cover of the book e-Design by Leighton Johnson
Cover of the book Structure and Dynamics of Membranes by Leighton Johnson
Cover of the book The Earth's Ionosphere by Leighton Johnson
Cover of the book Socializing Children through Language by Leighton Johnson
Cover of the book Scattering, Natural Surfaces, and Fractals by Leighton Johnson
Cover of the book Regional Geology and Tectonics: Phanerozoic Rift Systems and Sedimentary Basins by Leighton Johnson
Cover of the book Oil Sand Production Processes by Leighton Johnson
Cover of the book Stored-Product Insect Resource by Leighton Johnson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy