"synopsis" may belong to another edition of this title.
Anti-attack procedures are presented with the goal of identifying, apprehending and successfully prosecuting attackers. The advice on carefully preserving volatile information, such as the list of processes active at the time of an attack, is easy to follow. The book is quick to endorse tools, the functionalities of which are described so as to inspire creative applications. Information on bad-guy behaviour is top-quality as well, giving readers knowledge of how to interpret logs and other observed phenomena. Mandia and Prosise don't--and can't--offer a foolproof guide to catching crackers in the act, but they do offer a great "best practices" guide to active surveillance. --David Wall
Topics covered: Monitoring computer systems for evidence of malicious activity and reacting to such activity when it's detected. With coverage of Windows and Unix systems as well as non-platform-specific resources like Web services and routers, the book covers the fundamentals of incident response, processes for gathering evidence of an attack and tools for making forensic work easier.
"About this title" may belong to another edition of this title.
Shipping:
£ 4.67
Within U.S.A.
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 2.35. Seller Inventory # Q-0072131829