Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition 273945

Код товару: 273945Паперова книга
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
  • The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
  • Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
  • The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building
About the Author
Rebekah Brown has spent more than two decades working in the intelligence analysis community; her previous roles include NSA network warfare analyst, Operations Chief of a United States Marine Corps cyber unit, and a U.S. Cyber Command training and exercise lead. Rebekah has helped develop threat intelligence and security awareness programs at the federal, state, and local level, as well as at multiple Fortune 500 companies.
Scott J Roberts is a security leader, analyst, software developer, and author. He is Head of Threat Research for Interpres Security and has led security teams and project in the defense industrial base, GitHub, Apple, Splunk, and most recently Argo AI. He is also a student and researcher at Utah State University, where he is focused on Anticipatory Intelligence, tackling emergent problems in national and cybersecurity. Scott J Roberts has served as an Advisory Committee for SANS CTI & DFIR Summits. Along with Rebekah Brown, he authored O'Reilly's Intelligence-Driven Incident Response and has spoken at numerous industry events on incident response and cyber threat intelligence. Scott J Roberts is passionate about improving security via automation, especially on macOS, and developing open and closed source tooling in Python, Go, & Swift.
1'700 ₴
Відправимо 25.10
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition - фото 1
Інші книги O'Reilly Media
Data Mesh. Delivering Data-Driven Value at Scale
197712
Zhamak Dehghani
2'400 ₴
Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes 1st Edition
300919
Brendan BurnsEddie VillalbaDave StrebelLachlan Evenson
2'100 ₴
Essential Math for Data Science. Take Control of Your Data with Fundamental Linear Algebra, Probability, and Statistics. 1st Edition
197704
Thomas Nield
2'600 ₴
Hands-On Large Language Models: Language Understanding and Generation 1st Edition
292893
Jay AlammarMaarten Grootendorst
1'800 ₴
Learning Git: A Hands-On and Visual Guide to the Basics of Git 1st Edition
273950
Anna Skoulikari
1'700 ₴
Python Data Science Handbook: Essential Tools for Working with Data 2nd Edition
274096
Jake VanderPlas
1'900 ₴
Mastering Financial Pattern Recognition: Finding and Back-Testing Candlestick Patterns with Python 1st Edition
269650
Sofien Kaabar
1'900 ₴
Hands-On Healthcare Data: Taming the Complexity of Real-World Data 1st Edition
197710
Andrew Nguyen
1'900 ₴
Fundamentals of Deep Learning. Designing Next-Generation Machine Intelligence Algorithms. 2nd Edition
197756
Nikhil BudumaJoe PapaNithin Buduma
1'900 ₴

Характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Номер видання
    2-ге вид.
  • Рік
    2023
  • Сторінок
    344
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Від видавця

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
  • The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
  • Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
  • The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building
About the Author
Rebekah Brown has spent more than two decades working in the intelligence analysis community; her previous roles include NSA network warfare analyst, Operations Chief of a United States Marine Corps cyber unit, and a U.S. Cyber Command training and exercise lead. Rebekah has helped develop threat intelligence and security awareness programs at the federal, state, and local level, as well as at multiple Fortune 500 companies.
Scott J Roberts is a security leader, analyst, software developer, and author. He is Head of Threat Research for Interpres Security and has led security teams and project in the defense industrial base, GitHub, Apple, Splunk, and most recently Argo AI. He is also a student and researcher at Utah State University, where he is focused on Anticipatory Intelligence, tackling emergent problems in national and cybersecurity. Scott J Roberts has served as an Advisory Committee for SANS CTI & DFIR Summits. Along with Rebekah Brown, he authored O'Reilly's Intelligence-Driven Incident Response and has spoken at numerous industry events on incident response and cyber threat intelligence. Scott J Roberts is passionate about improving security via automation, especially on macOS, and developing open and closed source tooling in Python, Go, & Swift.

Відгуки про Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition

Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition
Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition
1'700 ₴
Персонально для вас
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting 1st Edition
286418
Rafay Baloch
2'100 ₴
The Art of Mac Malware, Volume 2: Detecting Malicious Software
302607
Patrick Wardle
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Practical Purple Teaming: The Art of Collaborative Defense
303120
Alfie Champion
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Cryptography: Algorithms, Protocols, and Standards for Computer Security 1st Edition
306386
Zoubir Mammeri
3'800 ₴
Криптографія
2729
Александр Бабаш
126 ₴
Дитячий садок Вімельбух
137677
ПЕТ
168 ₴210 ₴