Trade in your item
Get a £0.29
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Incident Response: Computer Forensics Toolkit Paperback – 28 Apr 2003


See all formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
£33.59 £1.38


Trade In this Item for up to £0.29
Trade in Incident Response: Computer Forensics Toolkit for an Amazon Gift Card of up to £0.29, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details


More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

Your in–depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e–mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer arms you with the tools to reveal a security breach, gather evidence to report the crime, and conduct audits to prevent future attacks. He also provides you with a firm understanding of the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and how to work with law enforcement.

You’ll learn how to:

  • Recognize the telltale signs of an incident and take specific response measures
  • Search for evidence by preparing operating systems, identifying network devices, and collecting data from memory
  • Analyze and detect when malicious code enters the system and quickly locate hidden files
  • Perform keyword searches, review browser history, and examine Web caches to retrieve and analyze clues
  • Create a forensics toolkit to prop–erly collect and preserve evidence
  • Contain an incident by severing network and Internet connections, and then eradicate any vulnerabilities you uncover
  • Anticipate future attacks and monitor your system accordingly
  • Prevent espionage, insider attacks, and inappropriate use of the network
  • Develop policies and procedures to carefully audit the system

CD–ROM includes:

  • Helpful tools to capture and protect forensic data; search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtained
  • Valuable checklists developed by the author for all aspects of incident response and handling

About the Author

DOUGLAS SCHWEITZER is an Internet security specialist and authority on malicious code and computer forensics. He is a Cisco Certified Network Associate and Certified Internet Webmaster Associate, and holds A+, Network+, and i–Net+ certifications. Schweitzer is also the author of Internet Security Made Easy and Securing the Network from Malicious Code.

Inside This Book (Learn More)
First Sentence
THE HI-TECH REVOLUTION SWEEPING THE GLOBE in communications and information technology has truly made the world a smaller place. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.co.uk.
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 9 reviews
10 of 11 people found the following review helpful
Readable and relevant - but US-centric 26 Mar 2004
By Ed - Published on Amazon.com
Format: Paperback
The introduction describes this book as a "complete introductory course in basic computer forensics and incident response" and that is indeed the case. It begins with an overview of computer forensics and incident response in Chapter 1 and progresses to legal considerations, obtaining and preserving digital evidence, system internals (mostly Windows although Unix is also discussed) and ends with analysis of real-world attacks and possible defences in Chapter 12. Press references and citations are used to give the big picture. All in all this is a book which I would recommend with two "buts": first, the author is writing from a US perspective for a US reader, presenting and discussing US-specific legislation and legal issues; while this would be of direct interest to our US-based brethren it is of no much use to anyone else. Second, platform-dependent coverage is mostly Windows, and although Linux/Unix get mentioned throughout the book the coverage of UNIX internals and forensics is not on par with Windows counterparts. Having said this, if you are in the US and are using Windows, do get this book - it is a readable and straight introduction to a complex and interesting field which becomes more and more important.
8 of 9 people found the following review helpful
Fair introductory text, could be much better. 24 Jan 2004
By Tom Grozny - Published on Amazon.com
Format: Paperback
The author covers different aspects of incident response, but fails to go deeper in the matter.
The author talks briefly about types of attacks, briefly about forensics tools, and briefly about the incident response procedures. Such shallow coverage of the topics makes for a quite dissappointing read.
On the other hand he offers the readers complete text of USA Patriot Act 2001 - with little discussion of its implications, privacy concerns and its impact on the organizational security! Readers also get treated to full texts of Janet Renot(sp?) speeches - also with little explanation. Seems he tried to increase the word count of the book.
Forensics tools are mentioned with instructions to run them starting as "Step 1:Click the Start menu button". Every tool has a half a page description on how to start it with a screenshot taking up the rest of the page.
Forensics techniques are described, but the author presents this quite technical material in the abstract, easy-to-read form that takes away all the usefullness of it - reads like a summary.
Incident response chapters present the reader with the common sense material. Might be useful to get an idea of what is involved in developing a incident response process, but it's hard to find it practical - it's simply too general.
A fair introductory book, could be much better.
4 of 4 people found the following review helpful
Excellent Book on the Subject of Computer Incident Response 15 July 2003
By Tony Bradley - Published on Amazon.com
Format: Paperback
Incident Response is a must-read book for anyone who has to handle computer security incidents. It is written in an easy-to-read format that even those new to the subject can follow, while providing enough depth and detail to be valuable as a reference book for experienced professionals. The appendix on the provisions of the USA PATRIOT Act and its impact on information security along with the CD containing many useful freeware and trialware software programs are worth the cost of the book in and of themselves. If you are in a position where you need to know how to respond when a computer incident occurs, or if you just want to learn more about this subject this book is a great place to start.
1 of 1 people found the following review helpful
Timely and worthwhile! 23 Jan 2004
By Marcus J. Ranum - Published on Amazon.com
Format: Paperback
This book gives the reader a solid grounding in a difficult field. Since forensics and response are an area where you're up against a creative enemy, it's impossible to give the reader a cookbook approach. Schweitzer gives the reader the tools and framework necessary to begin tackling this very difficult problem. I'm really happy to see this book available on the market, since the problem it addresses is one that's getting worse all the time and shows no sign of getting better soon.
Good job, Doug!
mjr.
3 of 4 people found the following review helpful
AWESOME WORK...ONCE AGAIN 27 May 2003
By hollie brostek - Published on Amazon.com
Format: Paperback
Mr Schweitzer has hit the nail on the head once again! The subject matter is extremely timely and accurate.
This book is a must have for any network administrator as well as a small business with stand alone PCs. You never know what your employees are doing with their computers.
I found the book extremely helpful and easy to read. It provides the technical guidance without being too over technical. Also, the added free resources that are provided pay for the book.
Were these reviews helpful? Let us know


Feedback