Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach t...

Buy Now From Amazon

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

  • Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
  • Identify the key steps to completing a successful computer incident response investigation
  • Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams


  • Used Book in Good Condition
  • Used Book in Good Condition

Similar Products

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.Malware Forensics Field Guide for Windows Systems: Digital Forensics Field GuidesThe Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac MemoryDigital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd EditionIncident Response & Computer Forensics, Third EditionThe Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at RiskCrafting the InfoSec Playbook: Security Monitoring and Incident Response Master PlanMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code