1 / 107
文档名称:

Guide To Computer And Network Data Analysis Applying Forensic Techniques To Incident Response.pdf

格式:pdf   页数:107
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Guide To Computer And Network Data Analysis Applying Forensic Techniques To Incident Response.pdf

上传人:kuo08091 2013/12/23 文件大小:0 KB

下载得到文件列表

Guide To Computer And Network Data Analysis Applying Forensic Techniques To Incident Response.pdf

文档介绍

文档介绍:Special Publication 800-86
(Draft)
Guide puter and
Network Data Analysis:
Applying Forensic Techniques
to Incident Response
mendations of the National Institute
of Standards and Technology

Tim Grance
Suzanne Chevalier
Karen Kent
Hung Dang
NIST Special Publication 800-86 Guide puter work Data
(Draft) Analysis: Applying Forensic Techniques
to Incident Response (Draft)

mendations of the National
Institute of Standards and Technology

Tim Grance, Suzanne Chevalier,
Karen Kent, Hung Dang


C O M P U T E R S E C U R I T Y


Computer Security Division
Information Technology Laboratory
National Institute of Standards and
Technology
Gaithersburg, MD 20899-8930

August 2005





. Department merce
Carlos M. Gutierrez, Secretary
Technology Administration
Michelle O'Neill, Acting Under Secretary
merce for Technology
National Institute of Standards and Technology
William A. Jeffrey, Director
GUIDE PUTER WORK DATA ANALYSIS: APPLYING FORENSIC TECHNIQUES TO INCIDENT RESPONSE (DRAFT)

Reports puter Systems Technology

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the . economy and public welfare by providing technical leadership for the nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in puter systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts puter security and its collaborative
activities with industry, government, and anizations.