Cargando…

Practical Threat Detection Engineering A Hands-On Guide to Planning, Developing, and Validating Detection Capabilities /

Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organization Key Features Gain a comprehensive understanding of threat validation Leverage open source tools to test security detections Harness open source content to supplement det...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Roddie, Megan
Otros Autores: Deyalsingh, Jason, Katz, Gary J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1388493602
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230708s2023 enk o 000 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d ORMDA  |d IEEEE  |d OCLCO  |d UKMGB 
015 |a GBC3C2093  |2 bnb 
016 7 |a 021120958  |2 Uk 
020 |a 9781801073646 
020 |a 1801073643 
029 1 |a AU@  |b 000075033571 
029 1 |a UKMGB  |b 021120958 
035 |a (OCoLC)1388493602 
037 |a 9781801076715  |b O'Reilly Media 
037 |a 10251369  |b IEEE 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20230808 
049 |a UAMI 
100 1 |a Roddie, Megan. 
245 1 0 |a Practical Threat Detection Engineering  |h [electronic resource] :  |b A Hands-On Guide to Planning, Developing, and Validating Detection Capabilities /  |c Megan Roddie, Jason Deyalsingh, Gary J. Katz. 
250 |a 1st edition. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (328 p.) 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 |a Description based upon print version of record. 
520 |a Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organization Key Features Gain a comprehensive understanding of threat validation Leverage open source tools to test security detections Harness open source content to supplement detection and testing Book Description Threat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline. This comprehensive detection engineering guide will serve as an introduction for those who are new to detection validation, providing valuable guidelines to swiftly bring you up to speed. The book will show you how to apply the supplied frameworks to assess, test, and validate your detection program. It covers the entire life cycle of a detection, from creation to validation, with the help of real-world examples. Featuring hands-on tutorials, projects, and self-assessment questions, this guide will enable you to confidently validate the detections in your security program. By the end of this book, you'll have developed the skills necessary to test your security detection program and strengthen your organization's security measures. What you will learn Understand the detection engineering process Build a detection engineering test lab Learn how to maintain detections as code Understand how threat intelligence can be used to drive detection development Prove the effectiveness of detection capabilities to business leadership Learn how to limit attackers' ability to inflict damage by detecting any malicious activity early Who this book is for This book is for security analysts and engineers seeking to improve their organization's security posture by mastering the detection engineering lifecycle. To get started with this book, you'll need a basic understanding of cybersecurity concepts, along with some experience with detection and alert capabilities. 
505 0 |a Table of Contents Fundamentals of Detection Engineering The Detection Engineering Life Cycle Building a Detection Engineering Test Lab Detection Data Sources Investigating Detection Requirements Developing Detections Using Indicators of Compromise Developing Detections Using Behavioral Indicators Documentation and Detection Pipelines Detection Validation Leveraging Threat Intelligence Performance Management Career Guidance for Detection Engineers. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Anomaly detection (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Détection d'anomalies (Sécurité informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
700 1 |a Deyalsingh, Jason. 
700 1 |a Katz, Gary J. 
776 0 8 |i Print version:  |a Roddie, Megan  |t Practical Threat Detection Engineering  |d Birmingham : Packt Publishing, Limited,c2023 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801076715/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30610517 
994 |a 92  |b IZTAP