Kenneth R. van Wyk is an internationally recognized information security expert and author of the O'Reilly Media books, Incident Response and Secure Coding. In addition to providing consulting and training services through his company, KRvW Associates, LLC, he currently holds numerous positions: as a monthly columnist for on-line security portal, eSecurityPlanet, and a Visiting Scientist at Carnegie Mellon University's Software Engineering Institute.
Ken has 20+ years experience as an IT Security practitioner in the academic, military, and commercial sectors. He has held senior and executive technologist positions at Tekmark, Para-Protect, Science Applications International Corporation (SAIC), in addition to the U.S. Department of Defense and Carnegie Mellon and Lehigh Universities.
Ken also served a two-year elected position as a member of the Steering Committee, and a one-year elected position as the Chairman of the Steering Committee, for the Forum of Incident Response and Security Teams (FIRST) organization. At the Software Engineering Institute of Carnegie Mellon University, Ken was one of the founders of the Computer Emergency Response Team (CERT®). He holds an engineering degree from Lehigh University and is a frequent speaker at technical conferences, and has presented papers and speeches for CSI, ISF, USENIX, FIRST, AusCERT, and others. Ken is also a CERT® Certified Computer Security Incident Handler.
Richard Forno is a recognized security professional and coauthor of The Art of Information Warfare. He has held high-profile security positions at major companies and government organizations; he helped establish the first incident response team for the United States House of Representatives and provided advisory support to offices of the Department of Defense on information warfare. He is the cofounder of G2-Forward, a prominent information analysis and distribution service supporting the military intelligence and law enforcement communities. In 1998, he became the chief security officer for Network Solutions (the InterNIC), the company responsible for developing and operating the Internet Shared Registry System.
Foreword | ix | ||||
Preface | xiii | ||||
|
1 | (14) | |||
|
2 | (5) | |||
|
7 | (1) | |||
|
8 | (1) | |||
|
8 | (3) | |||
|
11 | (2) | |||
|
13 | (1) | |||
|
14 | (1) | |||
|
15 | (17) | |||
|
16 | (1) | |||
|
17 | (2) | |||
|
19 | (3) | |||
|
22 | (3) | |||
|
25 | (2) | |||
|
27 | (1) | |||
|
28 | (1) | |||
|
29 | (3) | |||
|
32 | (14) | |||
|
32 | (10) | |||
|
42 | (1) | |||
|
43 | (1) | |||
|
44 | (1) | |||
|
45 | (1) | |||
|
46 | (24) | |||
|
47 | (3) | |||
|
50 | (1) | |||
|
51 | (4) | |||
|
55 | (1) | |||
|
56 | (1) | |||
|
57 | (1) | |||
|
58 | (1) | |||
|
59 | (3) | |||
|
62 | (8) | |||
|
70 | (26) | |||
|
71 | (1) | |||
|
72 | (3) | |||
|
75 | (21) | |||
|
96 | (11) | |||
|
97 | (1) | |||
|
98 | (6) | |||
|
104 | (3) | |||
|
107 | (48) | |||
|
108 | (3) | |||
|
111 | (1) | |||
|
112 | (8) | |||
|
120 | (5) | |||
|
125 | (6) | |||
|
131 | (2) | |||
|
133 | (6) | |||
|
139 | (4) | |||
|
143 | (3) | |||
|
146 | (3) | |||
|
149 | (3) | |||
|
152 | (3) | |||
|
155 | (12) | |||
|
155 | (1) | |||
|
156 | (1) | |||
|
157 | (2) | |||
|
159 | (1) | |||
|
159 | (1) | |||
|
160 | (1) | |||
|
161 | (2) | |||
|
163 | (4) | |||
A. First | 167 | (27) | |||
B. Sample Incident Report | 194 | (3) | |||
Index | 197 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.