Intelligence-Driven Incident Response
Outwitting the Adversary
|Price||$42.88 - $58.19
|Authors||Scott Roberts, Rebekah Brown|
|Format||Paper book / ebook (PDF)|
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
- The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together;
- Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process - Find, Fix Finish, Exploit, Analyze, and Disseminate;
- The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building.
4 5 46
by Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.Surviving an incident, or a breach, requires the best r...
Price: $24.90 | Publisher: Apress | Release: 2018
by Jeff Bollinger, Brandon Enright, Matthew Valites
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own thre...
Price: $39.56 | Publisher: O'Reilly Media | Release: 2015
by Yuri Diogenes, Tom Shinder
This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key opera...
Price: $22.79 | Publisher: Microsoft Press | Release: 2018
by Yuri Diogenes, Tom Shinder
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key opera...
Price: $31.99 | Publisher: Microsoft Press | Release: 2019
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident r...
Price: $34.00 | Publisher: Wiley | Release: 2014
by Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...
Price: $105.99 | Publisher: McGraw-Hill | Release: 2018
by Pete Finnigan
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used...
Price: $22.25 | Publisher: Apress | Release: 2018
by Chet Hosmer
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windo...
Price: $25.80 | Publisher: Apress | Release: 2019