| 000 | 01135nam a2200205Ia 4500 | ||
|---|---|---|---|
| 005 | 20250520110650.0 | ||
| 008 | 240825s9999 xx 000 0 und d | ||
| 020 |
_a9781484248164 _qpbk |
||
| 041 | _aeng | ||
| 082 |
_a005.8 _bTHO |
||
| 100 | _aThompson, C Eric | ||
| 245 | 0 |
_aCybersecurity incident response _c/Eric C. Thompson |
|
| 260 |
_bApress _cc2018 |
||
| 300 |
_a176P _c23 cm |
||
| 500 | _aReprint, 2024 | ||
| 504 | _aindex | ||
| 520 | _aCreate, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. | ||
| 650 | _a Computer crimes; Computer networks Security measures; Computer security Management | ||
| 942 | _cREF | ||
| 999 |
_c545877 _d545877 |
||