Cybersecurity Incident Response
How to Contain, Eradicate, and Recover from Incidents
|Price||$24.90 - $31.80
|Author||Eric C. Thompson|
|Format||Paper book / ebook (PDF)|
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.
Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.
The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.
Know the sub-categories of the NIST Cybersecurity Framework; Understand the components of incident response; Go beyond the incident response plan; Turn the plan into a program that needs vision, leadership, and culture to make it successful; Be effective in your role on the incident response team.
5 5 2
by Scott Roberts, Rebekah Brown
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll le...
Price: $42.88 | Publisher: O'Reilly Media | Release: 2017
by Jeff Bollinger, Brandon Enright, Matthew Valites
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own thre...
Price: $39.56 | Publisher: O'Reilly Media | Release: 2015
by Chet Hosmer
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windo...
Price: $25.80 | Publisher: Apress | Release: 2019
by Yuri Diogenes, Tom Shinder
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key opera...
Price: $31.99 | Publisher: Microsoft Press | Release: 2019
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident r...
Price: $34.00 | Publisher: Wiley | Release: 2014
by Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...
Price: $105.99 | Publisher: McGraw-Hill | Release: 2018
by Pete Finnigan
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used...
Price: $22.25 | Publisher: Apress | Release: 2018
by Yuri Diogenes, Tom Shinder
This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key opera...
Price: $22.79 | Publisher: Microsoft Press | Release: 2018