References
To learn more about the topics covered in this chapter, take a look at the following resources:
- Stoll, Cliff. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Simon and Schuster, 2005.
- Stoll, C. (1988). Stalking the wily hacker. Communications of the ACM, 31(5), 484-497.
- Staves, A., Balderstone, H., Green, B., Gouglidis, A., & Hutchison, D. (2020, May). A Framework to Support ICS Cyber Incident Response and Recovery. In ISCRAM (pp. 638-651).
- Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide (NIST Special Publication 800-61 Rev. 2). National Institute of Standards and Technology: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
- Slayton, Rebecca, and Brian Clarke. “Trusting infrastructure: The emergence of computer security incident response, 1989–2005.” Technology and Culture 61.1 (2020): 173-206.
- Schumaker...