␡
- Understanding Key Points of the Follow-Up Phase
- Acquiring the Evidence
- Authenticating, Preserving, and Analyzing Incident Data
- Conducting Post-Incident Activities
- Using Legal, Investigative, and Government Recourses
- Article Series
- References
- Acknowledgments
- About the Author
- Ordering Sun Documents
- Accessing Sun Documentation Online
Like this article? We recommend
Acknowledgments
The author would like to recognize the following individuals for their contributions: senior personnel from Sun Services, Engineering, and Sun Corporate and IT Security for reviewing this article and providing helpful comments (in particular, Joel Weise, Martin England, Glenn Brunette, Matthias Kussinger, Larry Dunn, Wayne Vincent, and Steve Gilliss). Sun BluePrints OnLine program contributors in revising and editing are very much appreciated (in particular, Dan Barnett and Billie Markim).