Save on pre-loved laptops
Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows.
Buy new:
-57% $29.14
FREE delivery Friday, November 7 on orders shipped by Amazon over $35
Ships from: Amazon
Sold by: McGrawHill
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

See all
Something went wrong. Please try your request again later.

Incident Response & Computer Forensics, Third Edition 3rd Edition


{"desktop_buybox_group_1":[{"displayPrice":"$29.14","priceAmount":29.14,"currencySymbol":"$","integerValue":"29","decimalSeparator":".","fractionalValue":"14","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"x70QqdxT3XdhEUvF19nC%2BwL90TXMlFtYQHVvoJMpXlPrC%2BLpGnwYsZBoq6nKBkrJTK%2Bxj4tIIDeMOgMGAzB3SDHaEKk2L9BAMjBockUjMjpFHX0CB27bkbznm59bA0Xqbp8GE9SXcq%2BJJ73RPcus1Ov5Fuw9HsmJNjtI8CttbV9iSbijs5UOUXYvGGD88vXH","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$21.65","priceAmount":21.65,"currencySymbol":"$","integerValue":"21","decimalSeparator":".","fractionalValue":"65","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"x70QqdxT3XdhEUvF19nC%2BwL90TXMlFtY0FsMpLh4vsDB9GOFXr2oxWAC3PN5vUhAgKCh1gaZ4FpBkeQb5G9l7q0zIP6uj8BrPKTgF8F0BNYP%2F0i%2Fxnt8Sck%2BoZZLG5lG9C%2BU%2Bl4QcgRh6sGZCH9bN0oDvD0snVHU9LjWaj3g2RhOtjMwLAiaxeF28Ndajg%2BQ","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The definitive guide to incident response--updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.

  • Architect an infrastructure that allows for methodical investigation and remediation
  • Develop leads, identify indicators of compromise, and determine incident scope
  • Collect and preserve live data
  • Perform forensic duplication
  • Analyze data from networks, enterprise services, and applications
  • Investigate Windows and Mac OS X systems
  • Perform malware triage
  • Write detailed incident response reports
  • Create and implement comprehensive remediation plans

Frequently bought together

This item: Incident Response & Computer Forensics, Third Edition
$29.14
Get it as soon as Friday, Nov 7
In Stock
Sold by McGrawHill and ships from Amazon Fulfillment.
+
$23.74
Get it as soon as Wednesday, Nov 12
In Stock
Sold by CAPEPOINT LLC and ships from Amazon Fulfillment.
+
$30.46
Usually ships within 7 to 8 days
Ships from and sold by booksXpress.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
Some of these items ship sooner than the others.
Choose items to buy together.

Customers also bought or read

Loading...

From the brand

Editorial Reviews

From the Publisher

Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense’s Computer Forensics Laboratory.

Matthew Pepe is a senior technical director and co-founder of Mandiant where he has led numerous investigations, serves as a subject matter expert, and developed the forensic capabilities that are in use today. A veteran of the U.S. Air Force, he served in the Office of Special Investigations’ Computer Forensics Laboratory.

Kevin Mandia is senior vice president and chief operating officer of FireEye. He founded Mandiant in 2004 and served as the chief executive officer. While in the U.S. Air Force, Kevin served as a computer security officer at the Pentagon and as a special agent in the Air Force Office of Special Investigations.

About the Author

Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of NASA and the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense's Computer Forensics Laboratory.
Matthew Pepe is a senior technical director and co-founder of Mandiant where he has led numerous investigations, serves as a subject matter expert, and developed the forensic capabilities that are in use today. A veteran of the U.S. Air Force, he served in the Office of Special Investigations' Computer Forensics Laboratory.
Kevin Mandia is senior vice president and chief operating officer of FireEye. He founded Mandiant in 2004 and served as the chief executive officer. While in the U.S. Air Force, Kevin served as a computer security officer at the Pentagon and as a special agent in the Air Force Office of Special Investigations.

Product details

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.7 out of 5 stars
215 global ratings

Customers say

Customers find this incident response book to be a must-read for cyber-security professionals, praising its informative content and clear presentation. They appreciate its organization and reference material, with one customer noting it provides references to appropriate tools. The book effectively covers incident response scenarios, making it a valuable resource for professionals in the field.

10 customers mention "Readability"10 positive0 negative

Customers find the book highly readable and consider it a must-read for cyber-security professionals, with one customer noting it is excellent for all classes of incident responders.

"Very well written and organized book. I throughly enjoyed reading this book (half way through)" Read more

"Bought for an IR class. Great read considering I'm supposed to be learning... :)" Read more

"...It is a joy to read, and I am of the same mind as the other reviewers who have given it 5 stars - it's a must-read for every cyber-security..." Read more

"A bit outdated, but a good read." Read more

9 customers mention "Information quality"9 positive0 negative

Customers find the book informative and valuable, with one customer noting its focused explanations and another highlighting its case studies.

"Great read on IR topic. Finding lots of valuable content" Read more

"...There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book...." Read more

"Great resource" Read more

"Great read, very informative." Read more

6 customers mention "Ease of understanding"5 positive1 negative

Customers find the book clear and easy to understand.

"...The concepts are easy to follow and it provides references to the appropriate tools for the job." Read more

"...are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff) -..." Read more

"...For beginners, it lays down a clear and straightforward blueprint into IR investigations. For IR veterans, it serves as a refresher...." Read more

"I love this book. It is probably the easiest to understand forensics book." Read more

4 customers mention "Incident response"4 positive0 negative

Customers appreciate the book's incident response content, with one mentioning it includes real-life scenarios.

"This is an excellent resource on Incident Response / Digital Forensics that I would quickly recommend to anyone serious about the topic...." Read more

"...The first few chapters are great since it gives real life incident response scenarios that are seen in the community." Read more

"...Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -..." Read more

"Incident Response & Computer Forensics..." Read more

4 customers mention "Organization"3 positive1 negative

Customers appreciate the organization of the book.

"Very well written and organized book. I throughly enjoyed reading this book (half way through)" Read more

"This book takes you through setup, organization, structure, where and how, case studies, plus provides rationale on why! Thumbs up!" Read more

"...Its text is arranged like a novel which made me quickly lose interest." Read more

"...know their shit (duh), - are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff) -..." Read more

3 customers mention "Reference material"3 positive0 negative

Customers appreciate the book as a reference material, with one mentioning it provides references to appropriate tools.

"This is a very nice reference." Read more

"...The concepts are easy to follow and it provides references to the appropriate tools for the job." Read more

"...When you've finished it's nice to keep around for referencing." Read more

Top reviews from the United States

  • Reviewed in the United States on October 28, 2014
    Format: PaperbackVerified Purchase
    I would like to add the following comments - I personally know two of the authors and the technical editor for over 15 years. I have edition one and two and recently purchased edition three.

    I not only recommend the read for security professionals - I recommend the read for CXOs of companies and senior management in the Federal, State, Local governments - and of course the Military.

    Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -

    Spend sometime reading and understanding the Foreword section - written by Jamie, another expert in the area. He sets the tone for a valuable education trip.

    There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book.

    Lastly in Chapter 18 they "set the Strategic Direction" - They list 10 recommendations - Follow them if you want to keep your system as safe as possible with today's technology.

    Kudos go to the authors and the people who supported them throughout their professional careers.
    13 people found this helpful
    Report
  • Reviewed in the United States on March 26, 2019
    Format: PaperbackVerified Purchase
    Reading this book it is evident that the authors:
    - know their shit (duh),
    - are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff)
    - are great at teaching (case studies; teach not only what to do but also why to do it, and what may happen if you don't, with short 2-sentence examples to spice it up)

    It is a joy to read, and I am of the same mind as the other reviewers who have given it 5 stars - it's a must-read for every cyber-security professional.
    2 people found this helpful
    Report
  • Reviewed in the United States on December 29, 2022
    Format: PaperbackVerified Purchase
    A bit outdated, but a good read.
  • Reviewed in the United States on January 6, 2018
    Format: PaperbackVerified Purchase
    This book is a collaboration between three highly respected DFIR examiners, including Kevin Mandian who was the founder of Mandiant—named Best Security Company by SC Magazine in 2012 and 2013 (now under FireEye). Although I have a background in DFIR, I had more experience in dead-box Digital Forensics and wanted to expand my knowledge and experience in IR, thereby prompting me to purchase this book. Although it is already four years old, the framework, workflow, and methods that the authors provide are still very relevant. In a nutshell, this book should be a manual in every DFIR’s reference shelve. For beginners, it lays down a clear and straightforward blueprint into IR investigations. For IR veterans, it serves as a refresher. If they wrote another on tomorrow, I would buy it immediately because the information is extremely useful.
    4 people found this helpful
    Report
  • Reviewed in the United States on February 18, 2019
    Format: KindleVerified Purchase
    Great book beginning to end. I would highly recommend anyone in the DFIR, Security Operations, or threat intel community to make this a mandatory reading for new hires or individuals new to cyber security. Hopefully they will write another one in the next couple of years as technology and attack methods change rapidly. The first few chapters are great since it gives real life incident response scenarios that are seen in the community.
  • Reviewed in the United States on October 14, 2015
    Format: PaperbackVerified Purchase
    The first 6 chapters are a bit repetitive, but after that's been seared into your memory it becomes a great guid. When you've finished it's nice to keep around for referencing.
  • Reviewed in the United States on December 15, 2018
    Format: PaperbackVerified Purchase
    This is an excellent resource on Incident Response / Digital Forensics that I would quickly recommend to anyone serious about the topic. It's well-constructed with a logical flow, presented in an easily understandable manner. Well done.
    One person found this helpful
    Report
  • Reviewed in the United States on July 19, 2016
    Format: KindleVerified Purchase
    This book takes you through setup, organization, structure, where and how, case studies, plus provides rationale on why! Thumbs up!
    One person found this helpful
    Report

Top reviews from other countries

  • King
    5.0 out of 5 stars Five Stars
    Reviewed in the United Kingdom on October 21, 2014
    Format: PaperbackVerified Purchase
    Fantastic book to read and a great reference.
  • fabio torazza
    5.0 out of 5 stars Eccezionale!
    Reviewed in Italy on October 12, 2023
    Format: PaperbackVerified Purchase
    Ottimo libro. Consigliato
  • Kin Him Alan NG
    5.0 out of 5 stars An excellent reference.
    Reviewed in Canada on March 2, 2019
    Format: KindleVerified Purchase
    An excellent reference. A door to lead you into the profession of IT security with speciality on incident response. Highly recommended.
  • Chris E.
    5.0 out of 5 stars Five Stars
    Reviewed in the United Kingdom on April 24, 2015
    Format: PaperbackVerified Purchase
    Better than expected
  • Canadian User
    5.0 out of 5 stars Good introduction to IR
    Reviewed in Canada on December 28, 2017
    Format: PaperbackVerified Purchase
    Good introduction to IR. Lots of good procedural material in here. This is sort of the IR bible so I've heard from colleagues.