|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1082143652 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190114s2018 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d G3B
|d STF
|d MERER
|d OCLCF
|d OCLCQ
|d OCLCO
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492028253
|
029 |
1 |
|
|a AU@
|b 000069004320
|
035 |
|
|
|a (OCoLC)1082143652
|
037 |
|
|
|a CL0501000017
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Collins, Michael
|q (Michael Patrick),
|e author.
|
245 |
1 |
0 |
|a Threat hunting :
|b a guide to proactive network defense /
|c Michael Collins.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 8, 2019).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hackers
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492028260/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|