Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright About the Author About the Contributors Acknowledgments Chapter 1: An Overview of Data Breaches
Abstract Introduction What Is a Data Breach? Lifecycle of a Breach Sources of Data Breaches Impact of a Data Breach Historical Challenges With Breach Management Summary
Chapter 2: Preparing to Develop a Computer Security Incident Response Plan
Abstract Introduction CSIR Plan Planning Summary
Chapter 3: Developing a Computer Security Incident Response Plan
Abstract Introduction Developing the Data Breach Response Policy CSIR Plan Validation and Testing Summary
Chapter 4: Qualifying and Investigating a Breach
Abstract Introduction Invoking the CSIR Team Critical First Responder Steps Engaging and Managing Third Parties Investigating the Suspected Breach Confirming or Denying a Suspected Breach Conclusion
Chapter 5: Containing a Breach
Abstract Introduction Breach Containment Removing Posted Information From the Internet Containing Compromised Systems Summary
Chapter 6: Precisely Determining the Scope of a Breach
Introduction Database Forensics Overview Using Database Forensics in an Investigation Database Forensic Tools Connecting to the Database Database Artifacts Analyzing Database Artifacts What Are You Trying to Accomplish With Your Investigation? Summary
Chapter 7: Communicating Before, During and After a Breach
Abstract Introduction: The Concept of Cyber Resilience Before a Crisis During a Crisis After a Crisis
Chapter 8: Restoring Trust and Business Services After a Breach
Abstract Introduction The Difference Between Containment and Recovery Recovering Your Environment Certifying Your Environment Restoring Business Services Conducting a Breach Postmortem Review Improving Cyber Security After a Breach Creating a Cyber Defensible Position Summary
Chapter 9: Preparing for Breach Litigation
Abstract Introduction Breach Litigation From Claim to Settlement The Volume of Breach Lawsuits Preparing for Breach Litigation Breaches and the Board Summary
Appendix Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion