Intelligence-driven incident response outwitting the adversary
"Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that inf...
Saved in:
| Main Authors: | Roberts, Scott J. (Author), Brown, Rebekah (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Sebastopol, CA
O'Reilly Media
2017
|
| Edition: | First edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Digital archaeology the art and science of digital forensics
by: Graves, Michael (Michael W.)
Published: (2014)
by: Graves, Michael (Michael W.)
Published: (2014)
Cloud storage forensics
by: Quick, Darren
Published: (2014)
by: Quick, Darren
Published: (2014)
Sailing safe in cyberspace protect your identity and data
by: Kaushik, Anjali
Published: (2013)
by: Kaushik, Anjali
Published: (2013)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Digital Forensics, Investigation, and Response /
by: Easttom, Chuck
Published: (2022)
by: Easttom, Chuck
Published: (2022)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Cybercrime investigations the comprehensive resource for everyone
by: Bandler, John, et al.
Published: (2020)
by: Bandler, John, et al.
Published: (2020)
Investigating internet crimes an introduction to solving crimes in cyberspace
by: Shipley, Todd G, et al.
Published: (2014)
by: Shipley, Todd G, et al.
Published: (2014)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2012)
by: Sammons, John
Published: (2012)
Cyber crime investigations Bridging the gaps between security professionals,law enforcement and prosecutors
by: Reyes
Published: (2007)
by: Reyes
Published: (2007)
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012)
by: McCarthy, N.K
Published: (2012)
Policing digital crime
Published: (2014)
Published: (2014)
Digital forensics and incident response incident response tools and techniques for effective cyber threat response
by: Johansen, Gerard
Published: (2022)
by: Johansen, Gerard
Published: (2022)
Cyber crime and cyber terrorism investigator's handbook
Published: (2014)
Published: (2014)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri
Published: (2012)
by: Davidoff, Sherri
Published: (2012)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Digital Forensics and Cyber Crime Investigation : Recent Advances and Future Directions /
Published: (2025)
Published: (2025)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski, Michael
Published: (2018)
by: Ronczkowski, Michael
Published: (2018)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski, Michael
Published: (2018)
by: Ronczkowski, Michael
Published: (2018)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski
Published: (2007)
by: Ronczkowski
Published: (2007)
Alternate data storage forensics cAmber Schroader, Tyler Cohen
by: Schroader, Amber
by: Schroader, Amber
Forensik komputer suatu pengenalan
by: Sahizan Mohd Sagi
Published: (2010)
by: Sahizan Mohd Sagi
Published: (2010)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Mobile network forensics emerging research and opportunities
by: Sharevski, Filipo 1985
Published: (2019)
by: Sharevski, Filipo 1985
Published: (2019)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Dissecting the hack the forb1dd3n network
Published: (2010)
Published: (2010)
Similar Items
-
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014) -
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016) -
Digital archaeology the art and science of digital forensics
by: Graves, Michael (Michael W.)
Published: (2014) -
Cloud storage forensics
by: Quick, Darren
Published: (2014) -
Sailing safe in cyberspace protect your identity and data
by: Kaushik, Anjali
Published: (2013)


