Intelligence-driven incident response outwitting the adversary

"Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that inf...

Full description

Saved in:
Bibliographic Details
Main Authors: Roberts, Scott J. (Author), Brown, Rebekah (Author)
Format: Book
Language:English
Published: Sebastopol, CA O'Reilly Media 2017
Edition:First edition.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 54931
003 MY-KLNDU
005 20241219014854.0
008 221104s2017 caua i 001 0 eng d
020 |a 9781491934944 (pbk) 
039 9 |a 202211041240  |b VLOAD  |c 202009101821  |d shahrim  |y 202007061118  |z shahrim 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a HV 8079 .C65  |b .R63 2017 
100 1 |a Roberts, Scott J.  |e author 
245 1 0 |a Intelligence-driven incident response  |b outwitting the adversary  |c Scott J. Roberts and Rebekah Brown 
250 |a First edition. 
264 1 |a Sebastopol, CA  |b O'Reilly Media  |c 2017 
264 4 |c ©2017 
300 |a xvii, 260 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a "Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship." 
592 |a 0108/HL/2020  |b 25/8/2020  |c RM265.53  |h Han Lin Books 
650 |a Computer crimes  |x investigation. 
700 1 |a Brown, Rebekah  |e author 
999 |a vtls000065802  |c 54931  |d 54931