free tracker

Intelligence Driven Incident Response

Pub Date : 2017-08-21 | Author : Scott J Roberts | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491935194
ISBN 13 : 1491935197

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you a..


Intelligence Driven Incident Response

Pub Date : 2017-08-21 | Author : Scott J Roberts | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491935200
ISBN 13 : 1491935200

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you a..


Intelligence Driven Incident Response

Pub Date : 2016-08-25 | Author : Scott J. Roberts | Publisher : O'Reilly Media

ISBN 10 : 1491934948
ISBN 13 : 9781491934944

Threat intelligence—understanding the who, why, and how of attacks—is most valuable when applied directly to an organization’s incident response capability for hunting and in..


Crafting The Infosec Playbook

Pub Date : 2015-05-07 | Author : Jeff Bollinger | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491913604
ISBN 13 : 1491913606

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach..


Darkweb Cyber Threat Intelligence Mining

Pub Date : 2017-02-28 | Author : John Robertson | Publisher : Cambridge University Press

ISBN 10 : 9781316949313
ISBN 13 : 1316949311

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adv..


Data Driven Security

Pub Date : 2014-01-24 | Author : Jay Jacobs | Publisher : John Wiley & Sons

ISBN 10 : 9781118793824
ISBN 13 : 111879382X

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent securi..


Zero Trust Networks

Pub Date : 2017-06-19 | Author : Evan Gilman | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491962169
ISBN 13 : 149196216X

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone i..


Leave a Reply

Your email address will not be published. Required fields are marked *