Verkäufer
BooksRun, Philadelphia, PA, USA
Verkäuferbewertung 5 von 5 Sternen
AbeBooks-Verkäufer seit 2. Februar 2016
Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Bestandsnummer des Verkäufers 1587145022-8-1
Investigating the Cyber Breach
The Digital Forensics Guide for the Network Engineer
· Understand the realities of cybercrime and today’s attacks
· Build a digital forensics lab to test tools and methods, and gain expertise
· Take the right actions as soon as you discover a breach
· Determine the full scope of an investigation and the role you’ll play
· Properly collect, document, and preserve evidence and data
· Collect and analyze data from PCs, Macs, IoT devices, and other endpoints
· Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence
· Analyze iOS and Android devices, and understand encryption-related obstacles to investigation
· Investigate and trace email, and identify fraud or abuse
· Use social media to investigate individuals or online identities
· Gather, extract, and analyze breach data with Cisco tools and techniques
· Walk through common breaches and responses from start to finish
· Choose the right tool for each task, and explore alternatives that might also be helpful
The professional’s go-to digital forensics resource for countering attacks right now
Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.
Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.
Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now.
This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Über die Autorin bzw. den Autor:
Joseph Muniz is an architect at Cisco Systems and a security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and the U.S. government. Joseph’s current role gives him visibility into the latest trends in cybersecurity, from both leading vendors and customers. Examples of Joseph’s research include his RSA talk titled “Social Media Deception,” which has been quoted by many sources (search for “Emily Williams Social Engineering”), as well as his articles in PenTest Magazine regarding various security topics. Joseph runs The Security Blogger website, a popular resource for security, hacking, and product implementation. He is the author and contributor of several publications covering various penetration testing, certification, and security topics. You can follow Joseph at www.thesecurityblogger.com and @SecureBlogger.
Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations. Aamir creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. He has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. Aamir is considered an industry leader for creating detailed security architectures within complex computing environments. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement.
Titel: Investigating the Cyber Breach: The Digital ...
Verlag: Cisco Press (edition 1)
Erscheinungsdatum: 2018
Einband: Paperback
Zustand: Very Good
Auflage: 1.
Anbieter: Goodwill, Brooklyn Park, MN, USA
Zustand: good. Cover Case has some rubbing and edgewear. Access codes, CD's, slipcovers and other accessories may not be included. Bestandsnummer des Verkäufers 2Y6RVP004HSA_ns
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
paperback. Zustand: Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_439147403
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_415658688
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G1587145022I4N10
Anzahl: 1 verfügbar
Anbieter: Phatpocket Limited, Waltham Abbey, HERTS, Vereinigtes Königreich
Zustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Bestandsnummer des Verkäufers Z1-V-026-02600
Anzahl: 2 verfügbar
Anbieter: Studibuch, Stuttgart, Deutschland
paperback. Zustand: Gut. 464 Seiten; 9781587145025.3 Gewicht in Gramm: 1. Bestandsnummer des Verkäufers 986996
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bestandsnummer des Verkäufers GOR014126850
Anzahl: 1 verfügbar
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Bestandsnummer des Verkäufers ABNR-4436
Anbieter: Toscana Books, AUSTIN, TX, USA
Paperback. Zustand: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Bestandsnummer des Verkäufers Scanned1587145022
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Über den AutorJoseph Muniz is an architect at Cisco Systems and a security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and the U. Bestandsnummer des Verkäufers 247053181
Anzahl: Mehr als 20 verfügbar