Cargando…

Crafting the InfoSec playbook /

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elemen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Bollinger, Jeff (Autor), Enright, Brandon (Autor), Valites, Matthew (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., [2015]
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn910341774
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150529s2015 caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d CUS  |d OCLCO  |d DEBBG  |d OCLCF  |d DEBSZ  |d FEM  |d OCLCA  |d CEF  |d OCLCQ  |d U3G  |d UAB  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 968035071  |a 968975495 
020 |a 1491949406 
020 |a 9781491949405 
020 |a 9781491913604 
020 |a 1491913606 
020 |z 9781491949405 
029 1 |a DEBBG  |b BV042683022 
029 1 |a DEBSZ  |b 446582247 
029 1 |a GBVCP  |b 835872475 
035 |a (OCoLC)910341774  |z (OCoLC)968035071  |z (OCoLC)968975495 
037 |a CL0500000597  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Bollinger, Jeff,  |e author. 
245 1 0 |a Crafting the InfoSec playbook /  |c Jeff Bollinger, Brandon Enright & Matthew Valites. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
500 |a Includes index. 
520 |a Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals--and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Enright, Brandon,  |e author. 
700 1 |a Valites, Matthew,  |e author. 
776 0 8 |i Print version:  |a Bollinger, Jeff.  |t Crafting the InfoSec playbook.  |b First edition  |z 9781491913611  |w (OCoLC)908685807 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491913598/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28603322 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28577606 
994 |a 92  |b IZTAP