X hits on this document

183 views

0 shares

0 downloads

0 comments

44 / 47

Orion Incident Response Live CD 4

Henry, P. (2009, September 12). Best Practices In Digital Evidence Collection. Retrieved March 10, 2010, from SANS Computer Forensic Investigations and Incident Response Blog: http://blogs.sans.org/computer-forensics/2009/09/12/best- practices-in-digital-evidence-collection/

Khurana, H., Basney, J., Bakht, M., Freemon, M., Welch, V., & Butler, R. (2009). Palantir: A Framework for Collaborative Incident Response. New York: ACM.

Mandia, K., Prosise, C., & Pepe, M. (2003). Incident Response and Computer Forensics,

2nd Ed. Emeryville: McGraw-Hill Osborne Media.

Network Security Toolkit (NST v2.11.0). (2009, September 22). Retrieved March 10, 2010, from http://networksecuritytoolkit.org/nst/index.html

Offensive Security. (2010, April 19). BackTrack Linux. Retrieved April 19, 2010, from http://www.backtrack-linux.org/

Scarefone, K., Grance, T., & Masone, K. (2008). Computer Security Incident Handling Guide, NIST SP 800-61-Rev1. NIST.

Securix-NSM. (2010). Retrieved March 10, 2010, from SecurixLive: http://www.securixlive.com/knoppix-nsm/

Skoudis, E. (2009). Incident Handling Step-by-Step and Computer Crime Investigation. In Security 504 Hacker Techniques, Exploits, and Incident Handling (pp. 12-117).

The SANS Institute.

Tshark examples: howto capture and dissect network traffic. (2009, December 13). Retrieved March 12, 2010, from CodeAlias: Networking & Coding Articles: http://www.codealias.info/technotes/the_tshark_capture_and_filter_example_page

John Jarocki, john.jarocki@gmail.com

Document info
Document views183
Page views184
Page last viewedFri Jan 20 11:59:27 UTC 2017
Pages47
Paragraphs864
Words8806

Comments