Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
暂无分享,去创建一个
[1] L. Johnson,et al. Minimum Security Requirements for Federal Information and Information Systems , 2006 .
[2] Eugene Schultz,et al. Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .
[3] John R. Vacca,et al. System Forensics, Investigation, And Response , 2010 .
[4] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[5] Jim Mellander,et al. Intrusion Detection & Prevention , 2003 .
[6] Karen A. Scarfone,et al. Computer Security Incident Handling Guide , 2004 .
[7] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[8] Robin M. Ruefle,et al. Handbook for Computer Security Incident Response Teams (CSIRTs) , 2003 .
[9] Shirley M. Radack,et al. Federal Information Processing Standard (FIPS) 199, Standards for Security | NIST , 2004 .
[10] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[11] Harlan Carvey. Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series) , 2004 .
[12] John R. Vacca,et al. Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series) , 2005 .