Customers who viewed this item also viewed
Buy new:
-16% $39.71$39.71
FREE delivery Friday, November 7
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$27.00$27.00
FREE delivery Saturday, November 8
Ships from: BooksRun Sold by: BooksRun
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Applied Incident Response 1st Edition
Purchase options and add-ons
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including:
- Preparing your environment for effective incident response
- Leveraging MITRE ATT&CK and threat intelligence for active network defense
- Local and remote triage of systems using PowerShell, WMIC, and open-source tools
- Acquiring RAM and disk images locally and remotely
- Analyzing RAM with Volatility and Rekall
- Deep-dive forensic analysis of system drives using open-source or commercial tools
- Leveraging Security Onion and Elastic Stack for network security monitoring
- Techniques for log analysis and aggregating high-value logs
- Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox
- Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more
- Effective threat hunting techniques
- Adversary emulation with Atomic Red Team
- Improving preventive and detective controls
- ISBN-101119560268
- ISBN-13978-1119560265
- Edition1st
- PublisherWiley
- Publication dateJanuary 29, 2020
- LanguageEnglish
- Dimensions7.4 x 1.1 x 9.1 inches
- Print length464 pages
Frequently bought together

Frequently purchased items with fast delivery
Law Enforcement Responder: .Randy G. StairPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7Only 15 left in stock - order soon.
The Game: A Rookie Firefighter's Manual For SuccessPaperbackFREE Shipping on orders over $35 shipped by AmazonGet it as soon as Friday, Nov 7
Emergency Medical Responder: First on SceneChris Le BaudourPaperbackFREE ShippingGet it Nov 6 - 10Only 2 left in stock - order soon.
Fire Department Incident Safety Officer, Revised: .PaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Crisis Management and Emergency PlanningHardcoverFREE Shipping by AmazonGet it as soon as Friday, Nov 7
Informed's NIMS Incident Command System Field GuideInformedSpiral-bound$3.99 shippingGet it Nov 10 - 14Only 1 left in stock - order soon.
Customers also bought or read
- Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Paperback$42.85$42.85$3.99 delivery Thu, Nov 20 - Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Paperback$23.74$23.74Delivery Tue, Nov 18 - CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 1: Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guides)
Paperback$49.99$49.99FREE delivery Friday - The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Paperback$35.53$35.53FREE delivery Tue, Dec 2 - Hacking and Security: The Comprehensive Guide to Ethical Hacking, Penetration Testing, and Cybersecurity (Rheinwerk Computing)
Paperback$48.07$48.07FREE delivery Fri, Nov 14 - Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
Paperback$32.85$32.85FREE delivery Wed, Nov 12 - Wireshark 101: Essential Skills for Network Analysis (Chappell University Solution)
Paperback$40.15$40.15$3.99 delivery Fri, Dec 5 - The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Paperback$40.89$40.89$3.99 delivery Wed, Dec 10 - Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
Paperback$41.99$41.99FREE delivery Friday - Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment
Paperback$34.64$34.64Delivery Friday - Malware Analysis Techniques: Tricks for the triage of adversarial software
Paperback$42.14$42.14FREE delivery Friday - Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
Paperback$39.36$39.36FREE delivery Sun, Nov 23 - Cybersecurity Tabletop Exercises: From Planning to Execution#1 Best SellerNetwork Disaster & Recovery Administration
Paperback$44.14$44.14FREE delivery Fri, Nov 28 - Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks
Paperback$27.32$27.32Delivery Friday - Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Paperback$42.42$42.42FREE delivery Friday - Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Paperback$42.60$42.60FREE delivery Friday - GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Paperback$47.63$47.63FREE delivery Sat, Nov 15 - Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
Paperback$42.70$42.70FREE delivery Friday - Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
Paperback$29.40$29.40$3.99 delivery Tue, Nov 18 - Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS#1 Best SellerMicrosoft .NET
Paperback$39.49$39.49FREE delivery Friday - Windows Internals: System architecture, processes, threads, memory management, and more, Part 1 (Developer Reference)
Paperback$59.99$59.99FREE delivery Friday - Security Engineering: A Guide to Building Dependable Distributed Systems
Hardcover$52.52$52.52$3.99 delivery Tue, Nov 18 - Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
Paperback$44.99$44.99FREE delivery Friday - This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Paperback$13.21$13.21Delivery Friday
Editorial Reviews
From the Inside Flap
DEFEND YOUR NETWORK WITH IMMEDIATELY APPLICABLE INCIDENT RESPONSE SKILLS
Incident response is critical for the active defense of any network, and incident responders need up-to-date, actionable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response methods and a framework through which to implement them. Drawing on the author's experience investigating intrusions for the FBI, US Department of Defense (DoD), and many international organizations, this authoritative book covers the core skills needed for incident handling and active network defense, including triaging systems, acquiring memory, imaging disks, collecting network data, log analysis, memory forensics, disk forensics, network security monitoring, adversary emulation, threat hunting, and more. Examples focus on free and open-source tools, but introduce commercial alternatives as well.
As a starting point for new incident handlers, or as a technical reference for hardened incident response veterans, this book details the latest techniques for responding to threats against your network, including:
- Preparing your environment for effective incident response
- Leveraging MITRE ATT&CK and threat intelligence for active network defense
- Local and remote triage of systems using PowerShell, WMIC, and open-source tools
- Acquiring RAM and disk images locally and remotely
- Analyzing RAM with Volatility and Rekall
- Deep-dive forensic analysis of system drives using open-source or commercial tools
- Leveraging Security Onion and Elastic Stack for network security monitoring
- Techniques for log analysis and aggregating high-value logs
- Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox
- Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more
- Effective threat hunting techniques
- Adversary emulation with Atomic Red Team
- Improving preventive and detective controls
From the Back Cover
DEFEND YOUR NETWORK WITH IMMEDIATELY APPLICABLE INCIDENT RESPONSE SKILLS
Incident response is critical for the active defense of any network, and incident responders need up-to-date, actionable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response methods and a framework through which to implement them. Drawing on the author's experience investigating intrusions for the FBI, US Department of Defense (DoD), and many international organizations, this authoritative book covers the core skills needed for incident handling and active network defense, including triaging systems, acquiring memory, imaging disks, collecting network data, log analysis, memory forensics, disk forensics, network security monitoring, adversary emulation, threat hunting, and more. Examples focus on free and open-source tools, but introduce commercial alternatives as well.
As a starting point for new incident handlers, or as a technical reference for hardened incident response veterans, this book details the latest techniques for responding to threats against your network, including:
- Preparing your environment for effective incident response
- Leveraging MITRE ATT&CK and threat intelligence for active network defense
- Local and remote triage of systems using PowerShell, WMIC, and open-source tools
- Acquiring RAM and disk images locally and remotely
- Analyzing RAM with Volatility and Rekall
- Deep-dive forensic analysis of system drives using open-source or commercial tools
- Leveraging Security Onion and Elastic Stack for network security monitoring
- Techniques for log analysis and aggregating high-value logs
- Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox
- Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more
- Effective threat hunting techniques
- Adversary emulation with Atomic Red Team
- Improving preventive and detective controls
About the Author
Steve Anson is a SANS Certified Instructor and co-founder of leading IT security company Forward Defense. He has over 20 years of experience investigating cybercrime and network intrusion incidents. As a former US federal agent, Steve specialized in intrusion investigations for the FBI and DoD. He has taught incident response and digital forensics techniques to thousands of students around the world on behalf of the FBI Academy, US Department of State, and the SANS Institute. He has assisted governments in over 50 countries to improve their strategic and tactical response to computer-facilitated crimes and works with a range of multinational organizations to prevent, detect and respond to network security incidents.
Product details
- Publisher : Wiley
- Publication date : January 29, 2020
- Edition : 1st
- Language : English
- Print length : 464 pages
- ISBN-10 : 1119560268
- ISBN-13 : 978-1119560265
- Item Weight : 1.66 pounds
- Dimensions : 7.4 x 1.1 x 9.1 inches
- Best Sellers Rank: #695,794 in Books (See Top 100 in Books)
- #216 in Computer Networking (Books)
- #287 in Computer Network Security
- Customer Reviews:
About the author

Steve Anson is the cofounder of Informed Defense and a Principal Instructor with the SANS Institute. He has previously served as a police officer, FBI High Tech Crimes Task Force agent, Special Agent with the U.S. DoD, and an instructor with the U.S. State Department Antiterrorism Assistance Program (ATA). He has trained thousands of law enforcement officers around the world in techniques of digital forensics and investigation.
Customer reviews
- 5 star4 star3 star2 star1 star5 star78%15%7%0%0%78%
- 5 star4 star3 star2 star1 star4 star78%15%7%0%0%15%
- 5 star4 star3 star2 star1 star3 star78%15%7%0%0%7%
- 5 star4 star3 star2 star1 star2 star78%15%7%0%0%0%
- 5 star4 star3 star2 star1 star1 star78%15%7%0%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book's content thorough, with one review highlighting its detailed links to tools. They appreciate its effectiveness, with one customer noting it's useful in difficult situations.
AI Generated from the text of customer reviews
Select to learn more
Customers find the content of the book thorough, with one customer highlighting its detailed links to tools and another noting how it solidifies understanding of monitoring techniques.
"...The coverage is comprehensive, thorough, and covers many of the latest "cutting edge" DFIR techniques...." Read more
"...I’m so glad I decided to purchase it! This book is very thorough and you will be a better security professional after reading this...." Read more
"Probably the best incident response book written! Well written, lots of details. Great book!" Read more
"Overall excellent content on DFIR. A great updated supplement to the Incident Response & Computer Forensics series...." Read more
Customers find the book effective, with one mentioning it provides useful techniques for handling difficult situations, while another notes it serves as a great updated supplement to the Incident Response guide.
"A must have, time tested and useful in difficult situations. Of course, if you get where I’m going with that comment...." Read more
"Overall excellent content on DFIR. A great updated supplement to the Incident Response & Computer Forensics series...." Read more
"Very good book. Has some great ideas and techniques for dealing with situations." Read more
"Great Read for Incident Response..." Read more
Reviews with images
Very good ir book, but terrible print quality.
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on March 17, 2020Format: KindleVerified PurchaseThis book is a bit of an anomaly. Ever since I purchased "Mastering Windows Network Forensics and Investigation" (1st and 2nd editions) years ago, I've been curious as to why the author hadn't published anything further. I was excited to see this book announced and even more so, after having read it, to learn that my anticipation was not in vain. This book is the most valuable book on DFIR that I've ever found. The coverage is comprehensive, thorough, and covers many of the latest "cutting edge" DFIR techniques. With that said, this book is an anomaly in that it is so very valuable but seems to be, as of yet, still widely unknown to the cybersecurity community. I would encourage anyone in (or even interested in) the cybersecurity field to purchase this book and study it thoroughly. Personally, this book is easily near the top of my list of favorites and I will be amazed if it doesn't hold it's title as the most valuable cybersecurity book that I've read this year.
- Reviewed in the United States on June 4, 2020Format: PaperbackVerified PurchaseI have being performing assessments at a Federal Agency for about 4 years, time for a change. So I order Applied Incident Response and have read about 5 chapters and have been very happy with the book The author is clearly knowledgeable, an "expert" in the subject matter, but many expert write poorly. Steve Anson writes with great clarity which makes reading/learning a pleasure. Additionally, the book is filled with detailed links to tools, articles, books ... to supplement the book. The examples of tools, e.g., Security Onion, the corresponding screenshots and text are perfectly in sync and easy to follow. Great technical content and the book is a pleasure to read.
- Reviewed in the United States on April 29, 2020Format: PaperbackVerified PurchaseI’m currently enrolled in SANS504 and was looking for some material to supplement my course. I was a little hesitant to purchase this book with it being recently published and not having a ton of reviews. I’m so glad I decided to purchase it! This book is very thorough and you will be a better security professional after reading this. The content of this book is outstanding and complements that SANS material quite nicely. Highly recommended!
- Reviewed in the United States on July 14, 2020Format: PaperbackVerified PurchaseSo I haven't had the chance to read it yet (heard really good things about this book!) but the book came somewhat damaged on the front cover. there are some scratches around the cover of the book and appears a bit bent between a bit the "E" in Incident and "N" in response. Still OK that it came in one piece haha.
- Reviewed in the United States on August 23, 2022Format: PaperbackVerified PurchaseA must have, time tested and useful in difficult situations. Of course, if you get where I’m going with that comment. Simplified, even the Exec’s understand it and that’s a huge win when budget season comes.
- Reviewed in the United States on March 12, 2020Format: PaperbackVerified PurchaseOverall excellent content on DFIR. A great updated supplement to the Incident Response & Computer Forensics series. I particularly enjoyed the Lateral Movement section as it really solidified my understanding in how to monitor, hunt and investigate common techniques of pivoting within a network.
- Reviewed in the United States on August 10, 2021Format: PaperbackVerified PurchaseThe inside of the book is brand new but I'm not exactly happy with the quality of the cover. I purchased a book brand new and with Amazon's new packaging, I don't think shipping books out in this helps to my review. I'm disappointed that I paid for a new book yet it came with binding damages...
3.0 out of 5 starsThe inside of the book is brand new but I'm not exactly happy with the quality of the cover. I purchased a book brand new and with Amazon's new packaging, I don't think shipping books out in this helps to my review. I'm disappointed that I paid for a new book yet it came with binding damages...Bought Paperback New...yet came with binding damages.
Reviewed in the United States on August 10, 2021
Images in this review
- Reviewed in the United States on November 3, 2022Format: PaperbackVerified PurchaseDefinitely worth getting
Top reviews from other countries
Amazon CustomerReviewed in the United Kingdom on July 25, 20201.0 out of 5 stars Terrible print quality
Format: PaperbackVerified PurchaseHaven’t read as the print quality is terrible. Pages are stuck together and it’s impossible to read it without destroying the book.
Vlad AndreiReviewed in Germany on January 11, 20215.0 out of 5 stars Good material
Format: PaperbackVerified PurchaseThis book covers a lot of topics and touches the most important parts. The topics are presented clearly and in a concise manner and it's a great addition to people studying forensics / incident response.












![RBT Exam Study Cards 2025-2026: Prep and Practice Test Questions for the Registered Behavior Technician Exam [Full Color Cards]](https://cdn.statically.io/img/m.media-amazon.com/images/I/31Rr3ML2kiL._AC_SR100,100_QL65_.jpg)
![OAR Study Guide: 500+ Practice Questions and Officer Aptitude Rating Test Prep [5th Edition]](https://cdn.statically.io/img/m.media-amazon.com/images/I/51D0av4XGEL._AC_SR100,100_QL65_.jpg)

![Intellectual Property In the Digital Age [Edition 2024]: A Practical Guide on Patents, Trademarks, Copyrights, and Protecting Confidential Information [AI Insight Bonus]](https://cdn.statically.io/img/m.media-amazon.com/images/I/41WitElGixL._AC_SR100,100_QL65_.jpg)


