Start reading Incident Response & Computer Forensics, Third Edition on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Incident Response & Computer Forensics, Third Edition

Incident Response & Computer Forensics, Third Edition [Kindle Edition]

Jason Luttgens , Matthew Pepe , Kevin Mandia
4.0 out of 5 stars  See all reviews (2 customer reviews)

Print List Price: £38.99
Kindle Price: £24.07 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £14.92 (38%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.


Amazon Price New from Used from
Kindle Edition £24.07  
Paperback £25.34  
Kindle Daily Deal
Kindle Daily Deal: At least 60% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.

Product Description

Product Description

The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans

About the Author

Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense’s Computer Forensics Laboratory.

Matthew Pepe is a senior technical director and co-founder of Mandiant where he has led numerous investigations, serves as a subject matter expert, and developed the forensic capabilities that are in use today. A veteran of the U.S. Air Force, he served in the Office of Special Investigations’ Computer Forensics Laboratory.

Kevin Mandia is senior vice president and chief operating officer of FireEye. He founded Mandiant in 2004 and served as the chief executive officer. While in the U.S. Air Force, Kevin served as a computer security officer at the Pentagon and as a special agent in the Air Force Office of Special Investigations.

Product details

  • Format: Kindle Edition
  • File Size: 9102 KB
  • Print Length: 544 pages
  • Simultaneous Device Usage: Up to 4 simultaneous devices, per publisher limits
  • Publisher: McGraw-Hill Osborne Media; 3 edition (4 Aug 2014)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B00JFG7152
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: #212,436 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Authors

Discover books, learn about writers, and more.

Customer Reviews

4 star
2 star
1 star
4.0 out of 5 stars
4.0 out of 5 stars
Most Helpful Customer Reviews
5.0 out of 5 stars Five Stars 21 Oct 2014
Format:Paperback|Verified Purchase
Fantastic book to read and a great reference.
Comment | 
Was this review helpful to you?
3.0 out of 5 stars Three Stars 3 Nov 2014
its ok
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 5.0 out of 5 stars  5 reviews
1 of 1 people found the following review helpful
5.0 out of 5 stars A must read for Computer Security Professionals 28 Oct 2014
By Mr Battery - Published on
Format:Paperback|Verified Purchase
I would like to add the following comments - I personally know two of the authors and the technical editor for over 15 years. I have edition one and two and recently purchased edition three.

I not only recommend the read for security professionals - I recommend the read for CXOs of companies and senior management in the Federal, State, Local governments - and of course the Military.

Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -

Spend sometime reading and understanding the Foreword section - written by Jamie, another expert in the area. He sets the tone for a valuable education trip.

There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book.

Lastly in Chapter 18 they "set the Strategic Direction" - They list 10 recommendations - Follow them if you want to keep your system as safe as possible with today's technology.

Kudos go to the authors and the people who supported them throughout their professional careers.
2 of 3 people found the following review helpful
5.0 out of 5 stars Fantastic Book and Reference 6 Sep 2014
By Tyler Halfpop - Published on
Format:Kindle Edition|Verified Purchase
This book is very highly recommended. It is written by some of the top thought leaders in incident response and digital forensics from Mandiant. It covers a lot of material and takes you through preparation, detection, collection, analysis, and remediation. Experience and practice are gold in incident response and this book is full of case studies where you can learn some hard fought lessons from some of the best. The analysis and collection sections of the book cover a lot of common systems and applications, which makes for a really helpful reference. I really enjoyed reading this book and feel like it provided me with a lot ammo to prepare for, detect, analyze, and kick out evil. If this topic is interesting to you I think you will find the same.
5.0 out of 5 stars Five Stars 23 Nov 2014
By Columbia Washington - Published on
Format:Paperback|Verified Purchase
Good :)
1 of 3 people found the following review helpful
5.0 out of 5 stars Five Stars 2 Sep 2014
By Walter Joseph - Published on
Format:Paperback|Verified Purchase
Great read for IT security professionals
1 of 3 people found the following review helpful
5.0 out of 5 stars Incident Response & Computer Forensics 25 Aug 2014
By Howard Smith - Published on
Format:Paperback|Verified Purchase
This is a very nice reference.
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category