Oracle Incident Response and Forensics Preparing for and Responding to Data Breaches /

Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Finnigan, Pete (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02983nam a2200469 4500
001 978-1-4842-3264-4
003 DE-He213
005 20191019192630.0
007 cr nn 008mamaa
008 171128s2018 xxu| s |||| 0|eng d
020 |a 9781484232644  |9 978-1-4842-3264-4 
024 7 |a 10.1007/978-1-4842-3264-4  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D3 
072 7 |a UN  |2 bicssc 
072 7 |a COM021000  |2 bisacsh 
072 7 |a UN  |2 thema 
072 7 |a UMT  |2 thema 
082 0 4 |a 005.74  |2 23 
100 1 |a Finnigan, Pete.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Oracle Incident Response and Forensics  |h [electronic resource] :  |b Preparing for and Responding to Data Breaches /  |c by Pete Finnigan. 
250 |a 1st ed. 2018. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2018. 
300 |a XVI, 199 p. 17 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a 1. Introduction -- 2. Artifacts -- 3. Incident Response Approach -- 4. Reacting to An Incident -- 5. Forensic Analysis -- 6. What To Do Next. 
520 |a Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done. This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used to investigate a database breach. You will learn the measures to put in place now to make it harder for an attack to be successful, and to aid in the detection and investigation of future attacks. You will know how to bring together tools and methods to create a holistic approach and investigation when an event occurs, helping you to be confident of your ability to react correctly and responsibly to threats against your organization's data. What You'll Learn: Detect when breaches have or may have occurred React with confidence using an organized plan Determine whether a suspected breach is real Determine the scope of data that has been compromised Preserve evidence for possible criminal prosecutions Put in place measures to aid future investigations. 
650 0 |a Database management. 
650 0 |a Data protection. 
650 1 4 |a Database Management.  |0 http://scigraph.springernature.com/things/product-market-codes/I18024 
650 2 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484232637 
776 0 8 |i Printed edition:  |z 9781484232651 
776 0 8 |i Printed edition:  |z 9781484246627 
856 4 0 |u https://doi.org/10.1007/978-1-4842-3264-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)