Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threa...
Autor principal: | Palacin, Valentina |
---|---|
Formato: | Electrónico eBook |
Idioma: | Indeterminado |
Publicado: |
[S.l.] :
Packt Publishing,
2021.
|
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Threat Intelligence and threat hunting /
Publicado: (2022) -
Threat hunting : a guide to proactive network defense /
por: Collins, Michael (Michael Patrick)
Publicado: (2018) -
The Foundations of Threat Hunting : Organize and Design Effective Cyber Threat Hunts to Meet Business Needs.
por: Maurice, Chad
Publicado: (2022) -
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations /
por: Liska, Allan
Publicado: (2018) -
Practical Cyber Threat Intelligence
por: Ozkaya, Erdal
Publicado: (2022)