Customers who viewed this item also viewed
Buy new:
-57% $29.14$29.14
FREE delivery Friday, November 7 on orders shipped by Amazon over $35
Ships from: Amazon Sold by: McGrawHill
Save with Used - Acceptable
$21.65$21.65
FREE delivery November 11 - 14 on orders shipped by Amazon over $35
Ships from: Amazon Sold by: Windflower Bookstore
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Incident Response & Computer Forensics, Third Edition 3rd Edition
Purchase options and add-ons
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methodsbehind--and remediation strategies for--today's most insidious attacks.
- Architect an infrastructure that allows for methodical investigation and remediation
- Develop leads, identify indicators of compromise, and determine incident scope
- Collect and preserve live data
- Perform forensic duplication
- Analyze data from networks, enterprise services, and applications
- Investigate Windows and Mac OS X systems
- Perform malware triage
- Write detailed incident response reports
- Create and implement comprehensive remediation plans
- ISBN-109780071798686
- ISBN-13978-0071798686
- Edition3rd
- PublisherMcGraw Hill
- Publication dateJuly 14, 2014
- LanguageEnglish
- Dimensions7.38 x 1.41 x 9.13 inches
- Print length624 pages
Frequently bought together

Frequently purchased items with fast delivery
Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd EditionPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Computer Security: A Hands-on Approach (Computer & Internet Security)PaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Forensics For DummiesPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Criminology For DummiesPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Practical Crime Scene Processing and Investigation, Third Edition (Practical Aspects of Criminal and Forensic Investigations)HardcoverFREE Shipping by AmazonGet it as soon as Friday, Nov 7Only 11 left in stock - order soon.
Fundamentals of Information Systems SecurityDavid KimPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Customers also bought or read
- The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Paperback$17.34$17.34Delivery Friday - Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Paperback$23.74$23.74Delivery Tue, Nov 18 - Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response
Paperback$52.99$52.99FREE delivery Friday - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$43.88$43.88FREE delivery Friday - The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Paperback$40.15$40.15$3.99 delivery Thu, Dec 11 - The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Paperback$39.23$39.23FREE delivery Friday - Intelligence-Driven Incident Response: Outwitting the Adversary
Paperback$44.94$44.94FREE delivery Friday - Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Paperback$13.35$13.35Delivery Tue, Nov 18 - Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Paperback$28.19$28.19Delivery Friday - Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Paperback$13.29$13.29Delivery Friday - Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition
Paperback$28.83$28.83Delivery Friday - Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
Paperback$54.99$54.99FREE delivery Friday - CompTIA Security+ Certification Kit: Exam SY0-701 (Sybex Study Guide)#1 Best SellerCompTIA Certification Guides
Paperback$41.83$41.83FREE delivery Friday - Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
Paperback$42.70$42.70FREE delivery Thu, Nov 13 - Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)
Paperback$96.94$96.94FREE delivery Mon, Nov 10 - CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 1: Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guides)
Paperback$49.99$49.99FREE delivery Friday - Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
Paperback$32.85$32.85FREE delivery Wed, Nov 12 - Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
Paperback$29.40$29.40$3.99 delivery Tue, Nov 18 - Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Paperback$18.73$18.73Delivery Friday - Hands-On Ethical Hacking and Network Defense (MindTap Course List)
Paperback$85.74$85.74FREE delivery Friday
From the brand
-
As a leading global education company, our mission is to partner with educators, learners, and professionals to help them access all the value that education can offer, no matter where their starting points may be.
For over 130 years, we have never stopped innovating to meet the ever-changing needs of educators and learners around the world – and will continue to support and celebrate their efforts every step of the way.
-
Editorial Reviews
From the Publisher
Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense’s Computer Forensics Laboratory.
Matthew Pepe is a senior technical director and co-founder of Mandiant where he has led numerous investigations, serves as a subject matter expert, and developed the forensic capabilities that are in use today. A veteran of the U.S. Air Force, he served in the Office of Special Investigations’ Computer Forensics Laboratory.
Kevin Mandia is senior vice president and chief operating officer of FireEye. He founded Mandiant in 2004 and served as the chief executive officer. While in the U.S. Air Force, Kevin served as a computer security officer at the Pentagon and as a special agent in the Air Force Office of Special Investigations.
About the Author
Matthew Pepe is a senior technical director and co-founder of Mandiant where he has led numerous investigations, serves as a subject matter expert, and developed the forensic capabilities that are in use today. A veteran of the U.S. Air Force, he served in the Office of Special Investigations' Computer Forensics Laboratory.
Kevin Mandia is senior vice president and chief operating officer of FireEye. He founded Mandiant in 2004 and served as the chief executive officer. While in the U.S. Air Force, Kevin served as a computer security officer at the Pentagon and as a special agent in the Air Force Office of Special Investigations.
Product details
- ASIN : 0071798684
- Publisher : McGraw Hill
- Publication date : July 14, 2014
- Edition : 3rd
- Language : English
- Print length : 624 pages
- ISBN-10 : 9780071798686
- ISBN-13 : 978-0071798686
- Item Weight : 2.35 pounds
- Dimensions : 7.38 x 1.41 x 9.13 inches
- Best Sellers Rank: #191,612 in Books (See Top 100 in Books)
- #88 in Privacy & Online Safety
- #122 in Computer Network Security
- #200 in Internet & Telecommunications
- Customer Reviews:
About the authors

Discover more of the author’s books, see similar authors, read book recommendations and more.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Discover more of the author’s books, see similar authors, read book recommendations and more.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find this incident response book to be a must-read for cyber-security professionals, praising its informative content and clear presentation. They appreciate its organization and reference material, with one customer noting it provides references to appropriate tools. The book effectively covers incident response scenarios, making it a valuable resource for professionals in the field.
AI Generated from the text of customer reviews
Customers find the book highly readable and consider it a must-read for cyber-security professionals, with one customer noting it is excellent for all classes of incident responders.
"Very well written and organized book. I throughly enjoyed reading this book (half way through)" Read more
"Bought for an IR class. Great read considering I'm supposed to be learning... :)" Read more
"...It is a joy to read, and I am of the same mind as the other reviewers who have given it 5 stars - it's a must-read for every cyber-security..." Read more
"A bit outdated, but a good read." Read more
Customers find the book informative and valuable, with one customer noting its focused explanations and another highlighting its case studies.
"Great read on IR topic. Finding lots of valuable content" Read more
"...There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book...." Read more
"Great resource" Read more
"Great read, very informative." Read more
Customers find the book clear and easy to understand.
"...The concepts are easy to follow and it provides references to the appropriate tools for the job." Read more
"...are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff) -..." Read more
"...For beginners, it lays down a clear and straightforward blueprint into IR investigations. For IR veterans, it serves as a refresher...." Read more
"I love this book. It is probably the easiest to understand forensics book." Read more
Customers appreciate the book's incident response content, with one mentioning it includes real-life scenarios.
"This is an excellent resource on Incident Response / Digital Forensics that I would quickly recommend to anyone serious about the topic...." Read more
"...The first few chapters are great since it gives real life incident response scenarios that are seen in the community." Read more
"...Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -..." Read more
"Incident Response & Computer Forensics..." Read more
Customers appreciate the organization of the book.
"Very well written and organized book. I throughly enjoyed reading this book (half way through)" Read more
"This book takes you through setup, organization, structure, where and how, case studies, plus provides rationale on why! Thumbs up!" Read more
"...Its text is arranged like a novel which made me quickly lose interest." Read more
"...know their shit (duh), - are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff) -..." Read more
Customers appreciate the book as a reference material, with one mentioning it provides references to appropriate tools.
"This is a very nice reference." Read more
"...The concepts are easy to follow and it provides references to the appropriate tools for the job." Read more
"...When you've finished it's nice to keep around for referencing." Read more
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on October 28, 2014Format: PaperbackVerified PurchaseI would like to add the following comments - I personally know two of the authors and the technical editor for over 15 years. I have edition one and two and recently purchased edition three.
I not only recommend the read for security professionals - I recommend the read for CXOs of companies and senior management in the Federal, State, Local governments - and of course the Military.
Their Real-World Incidents are exceptional - the Live Data Collection section (I would rate at 10 Star) -
Spend sometime reading and understanding the Foreword section - written by Jamie, another expert in the area. He sets the tone for a valuable education trip.
There are many lessons learned and good advice given. They also answered the "So What?" question throughout the book.
Lastly in Chapter 18 they "set the Strategic Direction" - They list 10 recommendations - Follow them if you want to keep your system as safe as possible with today's technology.
Kudos go to the authors and the people who supported them throughout their professional careers.
- Reviewed in the United States on March 26, 2019Format: PaperbackVerified PurchaseReading this book it is evident that the authors:
- know their shit (duh),
- are very sharp (logical and orderly layout of information; clear and focused explanations; no fluff)
- are great at teaching (case studies; teach not only what to do but also why to do it, and what may happen if you don't, with short 2-sentence examples to spice it up)
It is a joy to read, and I am of the same mind as the other reviewers who have given it 5 stars - it's a must-read for every cyber-security professional.
- Reviewed in the United States on December 29, 2022Format: PaperbackVerified PurchaseA bit outdated, but a good read.
- Reviewed in the United States on January 6, 2018Format: PaperbackVerified PurchaseThis book is a collaboration between three highly respected DFIR examiners, including Kevin Mandian who was the founder of Mandiant—named Best Security Company by SC Magazine in 2012 and 2013 (now under FireEye). Although I have a background in DFIR, I had more experience in dead-box Digital Forensics and wanted to expand my knowledge and experience in IR, thereby prompting me to purchase this book. Although it is already four years old, the framework, workflow, and methods that the authors provide are still very relevant. In a nutshell, this book should be a manual in every DFIR’s reference shelve. For beginners, it lays down a clear and straightforward blueprint into IR investigations. For IR veterans, it serves as a refresher. If they wrote another on tomorrow, I would buy it immediately because the information is extremely useful.
- Reviewed in the United States on February 18, 2019Format: KindleVerified PurchaseGreat book beginning to end. I would highly recommend anyone in the DFIR, Security Operations, or threat intel community to make this a mandatory reading for new hires or individuals new to cyber security. Hopefully they will write another one in the next couple of years as technology and attack methods change rapidly. The first few chapters are great since it gives real life incident response scenarios that are seen in the community.
- Reviewed in the United States on October 14, 2015Format: PaperbackVerified PurchaseThe first 6 chapters are a bit repetitive, but after that's been seared into your memory it becomes a great guid. When you've finished it's nice to keep around for referencing.
- Reviewed in the United States on December 15, 2018Format: PaperbackVerified PurchaseThis is an excellent resource on Incident Response / Digital Forensics that I would quickly recommend to anyone serious about the topic. It's well-constructed with a logical flow, presented in an easily understandable manner. Well done.
- Reviewed in the United States on July 19, 2016Format: KindleVerified PurchaseThis book takes you through setup, organization, structure, where and how, case studies, plus provides rationale on why! Thumbs up!
Top reviews from other countries
KingReviewed in the United Kingdom on October 21, 20145.0 out of 5 stars Five Stars
Format: PaperbackVerified PurchaseFantastic book to read and a great reference.
-
fabio torazzaReviewed in Italy on October 12, 20235.0 out of 5 stars Eccezionale!
Format: PaperbackVerified PurchaseOttimo libro. Consigliato
Kin Him Alan NGReviewed in Canada on March 2, 20195.0 out of 5 stars An excellent reference.
Format: KindleVerified PurchaseAn excellent reference. A door to lead you into the profession of IT security with speciality on incident response. Highly recommended.
Chris E.Reviewed in the United Kingdom on April 24, 20155.0 out of 5 stars Five Stars
Format: PaperbackVerified PurchaseBetter than expected
Canadian UserReviewed in Canada on December 28, 20175.0 out of 5 stars Good introduction to IR
Format: PaperbackVerified PurchaseGood introduction to IR. Lots of good procedural material in here. This is sort of the IR bible so I've heard from colleagues.
















![OAR Study Guide: 500+ Practice Questions and Officer Aptitude Rating Test Prep [5th Edition]](https://cdn.statically.io/img/m.media-amazon.com/images/I/51D0av4XGEL._AC_SR100,100_QL65_.jpg)

