Intelligence-driven incident response outwitting the adversary
"Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that inf...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Sebastopol, CA
O'Reilly Media
2017
|
| Edition: | First edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 54931 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014854.0 | ||
| 008 | 221104s2017 caua i 001 0 eng d | ||
| 020 | |a 9781491934944 (pbk) | ||
| 039 | 9 | |a 202211041240 |b VLOAD |c 202009101821 |d shahrim |y 202007061118 |z shahrim | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a HV 8079 .C65 |b .R63 2017 | ||
| 100 | 1 | |a Roberts, Scott J. |e author | |
| 245 | 1 | 0 | |a Intelligence-driven incident response |b outwitting the adversary |c Scott J. Roberts and Rebekah Brown |
| 250 | |a First edition. | ||
| 264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2017 | |
| 264 | 4 | |c ©2017 | |
| 300 | |a xvii, 260 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 520 | |a "Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship." | ||
| 592 | |a 0108/HL/2020 |b 25/8/2020 |c RM265.53 |h Han Lin Books | ||
| 650 | |a Computer crimes |x investigation. | ||
| 700 | 1 | |a Brown, Rebekah |e author | |
| 999 | |a vtls000065802 |c 54931 |d 54931 | ||


