Defensive cybersecurity fundamentals /
Everyone talks about the intrusion kill chain (sometimes called the “cyber kill chain”)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary might undertake to target that enterprise. However, much of what’s discussed p...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | Berlin, Amanda (Auteur) |
Format: | Électronique Vidéo |
Langue: | Inglés |
Publié: |
[Sebastopol, California] :
O'Reilly Media, Inc.,
[2022]
|
Édition: | [First edition]. |
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Documents similaires
-
Cybersecurity pevention and detection (Video collection).
Publié: (2022) -
Network Anomaly Detection : a Machine Learning Perspective.
par: Bhattacharyya, Dhruba Kumar
Publié: (2013) -
SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security /
par: Almalawi, Abdulmohsen, et autres
Publié: (2021) -
Managing security with Snort and IDS tools /
par: Cox, Kerry
Publié: (2004) -
Snort 2.0 intrusion detection /
par: Beale, Jay
Publié: (2003)