IntermediateIncident ResponseForensicsDefensive

Incident Response and Computer Forensics

3rd Edition

4 / 5

Luttgens, Pepe, and Mandia's working playbook for running an enterprise IR engagement: pre-engagement readiness, evidence acquisition, network and host forensics, and the project-management discipline that separates a controlled response from a panic.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2014
Publisher
McGraw Hill
Pages
624
Edition
3rd Edition
Language
English

Read this if

Junior-to-senior incident responders, SOC leads, and CISOs who need the canonical cross-discipline reference for what a real IR program looks like end to end. Strongest as a structural primer — the maturity model implicit in the book is still the field's de facto baseline.

Skip this if

Readers wanting current tradecraft on identity-attack response (AAD, OAuth abuse, golden SAML), cloud-IR specifically, or modern EDR-driven hunting; the book is largely on-prem 2014. Pair with cloud-IR-specific resources (Mandiant blog, AWS / Azure incident-response runbooks) for the missing layer.

Key takeaways

  • Readiness is the engagement: most of what determines the outcome of an IR is decided before the call comes in.
  • The acquire-then-analyze discipline still holds; cutting that corner is what produces the bad-headline retrospectives.
  • The book's project-management chapters are the underrated half — most failed responses are management failures, not technical ones.

Notes

Pair with The Art of Memory Forensics (Ligh et al.) for the analysis depth and with The Practice of Network Security Monitoring (Bejtlich) for the detection-side mindset. Mandiant's M-Trends report each year is the live update on how the field has moved since 2014. The book's sustained influence is why a fourth edition would be the most-anticipated DFIR title in the field.