Cargando…

Threat hunting : a guide to proactive network defense /

Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Collins, Michael (Michael Patrick) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, [2018]
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1082143652
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190114s2018 caua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d G3B  |d STF  |d MERER  |d OCLCF  |d OCLCQ  |d OCLCO  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCO 
020 |z 9781492028253 
029 1 |a AU@  |b 000069004320 
035 |a (OCoLC)1082143652 
037 |a CL0501000017  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Collins, Michael  |q (Michael Patrick),  |e author. 
245 1 0 |a Threat hunting :  |b a guide to proactive network defense /  |c Michael Collins. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed January 8, 2019). 
504 |a Includes bibliographical references. 
520 |a Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492028260/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP