Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements (häftad)
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
880
Utgivningsdatum
2013-10-24
Förlag
SYNGRESS MEDIA
Medarbetare
Jones, Andrew
Illustratör/Fotograf
Approx 100 illustrations
Illustrationer
Approx. 100 illustrations
Dimensioner
274 x 216 x 38 mm
Vikt
1907 g
Antal komponenter
1
Komponenter
12:B&W 8.5 x 11 in or 280 x 216 mm Perfect Bound on White w/Gloss Lam
ISBN
9781597497428
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements (häftad)

Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

Häftad Engelska, 2013-10-24
539
  • Skickas inom 10-15 vardagar.
  • Gratis frakt inom Sverige över 159 kr för privatpersoner.
This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab.

  • A step-by-step guide to designing, building and using a digital forensics lab
  • A comprehensive guide for all roles in a digital forensics laboratory
  • Based on international standards and certifications
Visa hela texten

Passar bra ihop

  1. Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
  2. +
  3. IT Governance

De som köpt den här boken har ofta också köpt IT Governance av Alan Calder, Steve Watkins (inbunden).

Köp båda 2 för 2678 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Recensioner i media

"What the book does do is provide a comprehensive and all-inclusive set of details that covers the entire lifecycle of a digital forensics investigation, ensuing evidence gathered, and chain of custody that results.Authors David Lilburn Watson and Andrew Jones bring decades of detailed real-world experience to the book, which readers are certain to find to be a unique reference."--RSAConference.com, December 16, 2013



Övrig information

David Watson heads up Forensic Computing Ltd, a specialist forensic recovery and investigation company. He is responsible for the coordination and efficient delivery of the computer forensic and electronic evidence recovery services, digital investigations, and provides support for a broad range of investigative, security and risk consulting assignments. He is a Certified Fraud Examiner (CFE) and a Certified Information Forensic Investigator (CIFI), a Certified Computer Crime Investigator (CCCI), an Advanced Certified Computer Forensics Technician (CCFT). In addition to specialised forensic certifications he is a Certified Information Security Systems Professional (CISSP), a Certified Information Systems Manager (CISM) and a Certified Information Systems Auditor (CISA). David has also led Forensic Computing Ltd to ISO 27001 and ISO 9001 certification, making FCL one of very few consultancies to hold such important credentials in the field of forensic services. After 25 years service with the British Army's Intelligence Corps, Andy Jones became a business manager and a researcher and analyst in the area of Information Warfare and computer crime at a defence research establishment. In Sept 2002, on completion of a paper on a method for the metrication of the threats to information systems, he left the defence environment to take up a post as a principal lecturer at the University of Glamorgan in the subjects of Network Security and Computer Crime and as a researcher on the Threats to Information Systems and Computer Forensics. At the university he developed and managed a well equipped Computer Forensics Laboratory and took the lead on a large number of computer investigations and data recovery tasks. He holds a Ph.D. in the area of threats to information systems. In January 2005 he joined the Security Research Centre at BT where he became a Chief Researcher and the head of information. Andy now holds a post as a visiting Professor at Edith Cowan University in Perth, Australia and he is currently the Programme Chair for the M.Sc. in Information Security at Khalifa University in Sharjah, UAE.

Innehållsförteckning

Chapter 1. Introduction

Chapter 2. Forensic Laboratory Accommodation

Chapter 3. Setting up a Laboratory

Chapter 4. IT Infrastructure

Chapter 5. Incident Response

Chapter 6. Working in the Laboratory

Chapter 7. Evidence Presentation

Chapter 8. Secure Working Practices

Chapter 9. Ensuring Continuity of Operations

Chapter 10. Outsourcing

Chapter 11. Effective Records Management

Chapter 12. Performance Assessment

Chapter 13. Health and Safety

Chapter 14. Human Resources

Chapter 15. Certification for the Laboratory

Chapter 16. Emerging Issues