Cargando…

Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.

Get to grips with security operations through incident response, the ATT & CK framework, active defense, and agile threat intelligence Key Features Explore robust and predictable security operations based on measurable service performance Learn how to improve the security posture and work on sec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hettema, Hinne
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1293248017
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 220124s2022 alu o 000 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d UKAHL  |d UKMGB  |d ORMDA  |d OCLCO  |d OCLCF  |d N$T  |d YDX  |d OCLCQ  |d IEEEE  |d OCLCO 
015 |a GBC1L0208  |2 bnb 
016 7 |a 020426530  |2 Uk 
019 |a 1292361287  |a 1305544397 
020 |a 9781801812559  |q (electronic book) 
020 |a 1801812551  |q (electronic book) 
020 |z 9781801815512  |q (paperback) 
020 |z 1801815518  |q (paperback) 
029 1 |a UKMGB  |b 020426530 
029 1 |a AU@  |b 000070397793 
035 |a (OCoLC)1293248017  |z (OCoLC)1292361287  |z (OCoLC)1305544397 
037 |a 9781801812559  |b Packt Publishing Pvt. Ltd 
037 |a 9781801815512  |b O'Reilly Media 
037 |a 10162954  |b IEEE 
050 4 |a QA76.9.A25  |b H48 2022 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Hettema, Hinne. 
245 1 0 |a Agile Security Operations :  |b Engineering for Agility in Cyber Defense, Detection, and Response. 
264 1 |a Birmingham :  |b Packt Publishing, Limited,  |c 2022. 
300 |a 1 online resource (254 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Get to grips with security operations through incident response, the ATT & CK framework, active defense, and agile threat intelligence Key Features Explore robust and predictable security operations based on measurable service performance Learn how to improve the security posture and work on security audits Discover ways to integrate agile security operations into development and operations Book Description Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best. Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding. By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference. What you will learn Get acquainted with the changing landscape of security operations Understand how to sense an attacker's motives and capabilities Grasp key concepts of the kill chain, the ATT & CK framework, and the Cynefin framework Get to grips with designing and developing a defensible security architecture Explore detection and response engineering Overcome challenges in measuring the security posture Derive and communicate business values through security operations Discover ways to implement security as part of development and business operations Who this book is for This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book. 
505 0 |a Table of Contents How Security Operations Are Changing Incident Response - A Key Capability in Security Operations Engineering for Incident Response Key Concepts in Cyber Defense Defensible Architecture Active Defense How Secure are You? - Measuring Security Posture Red, Blue and Purple Teaming Running and Operating Security Services Implementing Agile Threat Intelligence. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Business enterprises  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Entreprises  |x Sécurité  |x Mesures. 
650 7 |a Business enterprises  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Hettema, Hinne.  |t Agile Security Operations.  |d Birmingham : Packt Publishing, Limited, ©2022 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801815512/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39547160 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6843040 
938 |a EBSCOhost  |b EBSC  |n 3122135 
938 |a YBP Library Services  |b YANK  |n 302643600 
994 |a 92  |b IZTAP