Cargando…

Threat intelligence in practice : a practical guide to threat intelligence from successful organizations /

Many organizations are discovering that traditional security tools alone aren't enough to protect their networks. In this practical report, you'll explore threat intelligence, a method for collecting information on various forms of malicious cyber activity as a way to bolster your in-house...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Liska, Allan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, [2018]
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1082140166
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190114s2018 caua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d G3B  |d STF  |d MERER  |d OCLCF  |d OCLCQ  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ 
020 |z 9781491982082 
029 1 |a AU@  |b 000069004309 
035 |a (OCoLC)1082140166 
037 |a CL0501000017  |b Safari Books Online 
050 4 |a HV6773 
049 |a UAMI 
100 1 |a Liska, Allan,  |e author. 
245 1 0 |a Threat intelligence in practice :  |b a practical guide to threat intelligence from successful organizations /  |c Allan Liska. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed January 10, 2019). 
504 |a Includes bibliographical references. 
520 |a Many organizations are discovering that traditional security tools alone aren't enough to protect their networks. In this practical report, you'll explore threat intelligence, a method for collecting information on various forms of malicious cyber activity as a way to bolster your in-house measures. Author Allan Liska, security architect at Recorded Future, takes you through the threat intelligence cycle and explains what is required to put together an effective threat intelligence program for your company. Backed by case studies of several organizations that have successfully implemented these initiatives, this report explains that threat intelligence is actionable external information that, when correlated against internal data, can be used to detect or prevent an attack. You'll understand how threat intelligence enables you to stay abreast of current as well as future threats. Understand exactly what threat intelligence is, and how to correlate it to internal events Collect and apply threat intelligence, gain feedback, and incorporate feedback into your own threat intelligence cycle Examine tactical, operational, and strategic intelligence, and ensure that the right information gets to the right people Get practical examples from several organizations that have correctly implemented threat intelligence programs. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492049302/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP