+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Computer Incident Response and Forensics Team Management

  • ID: 2534666
  • Book
  • 352 Pages
  • Elsevier Science and Technology
1 of 3
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

  • Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
  • Identify the key steps to completing a successful computer incident response investigation
  • Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 3

Introduction and definitions

The Stages of Incident Response

Security Incident Response Team Members

Incident Evidence

Incident Response Tools

Incident Response Policy and Procedures

Legal Requirements and Considerations

Government Policy and Procedures

Forensics Process

Forensics Team Requirements

Forensics Team Policy and Procedures

Management of Forensics Evidence Handling

Forensics Tools

Legalities of Forensics

Forensics Team Oversight

Corporate Management

Relationship Management

Conclusion

Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Johnson, Leighton
Leighton Johnson, the CTO of ISFMT (Information Security Forensics Management Team), a provider of cybersecurity & forensics consulting and certification training, has presented computer security, cyber security and forensics lectures, conference presentations, training events and seminars all across the United States, Asia and Europe. He has over 40 years' experience in Computer Security, Cyber Security, Software Development and Communications Equipment Operations & Maintenance; Primary focus areas include computer security, information operations & assurance, incident response & forensics investigations, software system development life cycle focused on testing of systems, systems engineering and integration activities, database administration and cyber defense activities.
Note: Product cover images may vary from those shown
Adroll
adroll