Implementing Digital Forensic Readiness: From Reactive to Proactive Process
Autor Jason Sachowskien Limba Engleză Paperback – 29 feb 2016
- Explores the training needed to ensure competent performance of the handling, collecting, and preservation of digital evidence
- Discusses the importance of how long term data storage must take into consideration confidentiality, integrity, and availability of digital evidence
- Emphasizes how incidents identified through proactive monitoring can be reviewed in terms of business risk
- Includes learning aids such as chapter introductions, objectives, summaries, and definitions
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 402.80 lei 43-57 zile | |
ELSEVIER SCIENCE – 29 feb 2016 | 402.80 lei 43-57 zile | |
Taylor & Francis – 31 mar 2021 | 542.68 lei 43-57 zile | |
Hardback (1) | 1038.94 lei 43-57 zile | |
Taylor & Francis – 5 iun 2019 | 1038.94 lei 43-57 zile |
Preț: 402.80 lei
Preț vechi: 503.50 lei
-20% Nou
Puncte Express: 604
Preț estimativ în valută:
77.09€ • 80.07$ • 64.03£
77.09€ • 80.07$ • 64.03£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128044544
ISBN-10: 0128044543
Pagini: 374
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.76 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128044543
Pagini: 374
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.76 kg
Editura: ELSEVIER SCIENCE
Cuprins
Section A Digital Forensics
Chapter 1 Understanding Digital Forensics
Chapter 2 Investigative Process Models
Chapter 3 Evidence Management
Section B Digital Forensic Readiness
Chapter 4 Understanding Forensic Readiness
Chapter 5 Define Business Risk Scenarios
Chapter 6 Identify Potential Data Sources
Chapter 7 Determine Collection Requirements
Chapter 8 Establish Legal Admissibility
Chapter 9 Establish Secure Storage and Handling
Chapter 10 Enable Targeted Monitoring
Chapter 11 Map Investigative Workflows
Chapter 12 Establish Continuing Education
Chapter 13 Maintain Evidence-based Reporting
Chapter 14 Ensure Legal Review
Chapter 15 Accomplishing Forensic Readiness
Section C Appendices
Section D Templates
Chapter 1 Understanding Digital Forensics
Chapter 2 Investigative Process Models
Chapter 3 Evidence Management
Section B Digital Forensic Readiness
Chapter 4 Understanding Forensic Readiness
Chapter 5 Define Business Risk Scenarios
Chapter 6 Identify Potential Data Sources
Chapter 7 Determine Collection Requirements
Chapter 8 Establish Legal Admissibility
Chapter 9 Establish Secure Storage and Handling
Chapter 10 Enable Targeted Monitoring
Chapter 11 Map Investigative Workflows
Chapter 12 Establish Continuing Education
Chapter 13 Maintain Evidence-based Reporting
Chapter 14 Ensure Legal Review
Chapter 15 Accomplishing Forensic Readiness
Section C Appendices
Section D Templates
Notă biografică
Jason Sachowski has over twelve years of experience in digital forensic investigations, secure software development, and information security architecture. He currently manages a team of forensic investigators and data breach analysts for The Bank of Nova Scotia, commonly known as Scotiabank, Canada’s third largest and most international bank.
Throughout his career, Jason has performed hundreds of digital forensic investigations involving Enterprise servers, network logs, smart phones, and database systems. Complimentary to his technical experiences, he has also developed and maintained processes and procedures, managed large information security budgets, and governed the negotiation of third-party contracts.
In addition to his professional career, Jason is the author of book ‘Implementing Digital Forensic Readiness: From Reactive to Proactive Process’. He also serves as a contributing author and content moderator for DarkReading, is a subject matter expert for (ISC)2 professional exam development, and volunteers as an advocate for CyberBullying prevention and CyberSecurity awareness.
He holds several Information Security and Digital Forensic certifications including: Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP), Systems Security Certified Practitioner (SSCP), and EnCase Certified Examiner (EnCE).
Throughout his career, Jason has performed hundreds of digital forensic investigations involving Enterprise servers, network logs, smart phones, and database systems. Complimentary to his technical experiences, he has also developed and maintained processes and procedures, managed large information security budgets, and governed the negotiation of third-party contracts.
In addition to his professional career, Jason is the author of book ‘Implementing Digital Forensic Readiness: From Reactive to Proactive Process’. He also serves as a contributing author and content moderator for DarkReading, is a subject matter expert for (ISC)2 professional exam development, and volunteers as an advocate for CyberBullying prevention and CyberSecurity awareness.
He holds several Information Security and Digital Forensic certifications including: Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP), Systems Security Certified Practitioner (SSCP), and EnCase Certified Examiner (EnCE).
Descriere
Descriere de la o altă ediție sau format:
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program.