Intelligence-Driven Incident Response: Outwitting the Adversary 2nd Edition
暫譯: 智慧驅動的事件回應:智勝對手 第二版
Brown, Roberts
- 出版商: O'Reilly
- 出版日期: 2023-07-18
- 定價: $2,300
- 售價: 9.5 折 $2,185
- 貴賓價: 9.0 折 $2,070
- 語言: 英文
- 頁數: 343
- 裝訂: Quality Paper - also called trade paper
- ISBN: 109812068X
- ISBN-13: 9781098120689
-
相關分類:
資訊安全、Penetration-test
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$330C++黑客編程揭秘與防範(第2版) -
Deep Learning|用 Python 進行深度學習的基礎理論實作$580$458 -
Functional Programming in C++: How to improve your C++ programs using functional techniques (Paperback)$1,840$1,748 -
特洛伊木馬病毒程式設計:使用 Python$520$406 -
Python GUI 程式設計:PyQt5 實戰$690$538 -
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats$1,750$1,663 -
不會 C 也是資安高手:用 Python 和駭客大戰三百回合$620$490 -
5G 與車聯網 — 基於移動通信的車聯網技術與智能網聯汽車$336$319 -
$3525G時代:什麼是5G,它將如何改變世界 -
最完整 5G 技術架構白皮書$780$546 -
The Modern Security Operations Center (Paperback)$2,200$2,156 -
Deep Learning from Scratch$2,185$2,070 -
$446推薦系統 -
駭客自首:極惡網路攻擊的內幕技巧$780$616 -
5G 來了!:生活變革、創業紅利、產業數位轉型,搶占全球2510億美元商機,人人皆可得利的未來,你準備好了嗎?$360$284 -
Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748 -
Learn Enough JavaScript to Be Dangerous: A Tutorial Introduction to Programming with JavaScript$1,580$1,501 -
高速建立大型桌面應用 - 全新 Electron 框架現在就動手做$880$695 -
客戶留存數據分析與預測$768$730 -
Learn Enough Python to Be Dangerous: Software Development, Flask Web Apps, and Beginning Data Science with Python (Paperback)$1,580$1,548 -
駕馭 ChatGPT 4: 探索 Azure OpenAI 與 Cognitive Service for Language 開發實踐 (使用.NET 與 Node.js)$650$507 -
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities$2,200$2,090 -
一本精通 - Python 範例應用大全:Python 詳細語法教學 & 100+ 個 Python 範例$880$695 -
ChatGPT 開發手冊 - 用 OpenAI API ‧ LangChain ‧ Embeddings 設計 Plugin、LINE/Discord bot、股票分析與客服自動化助理$750$593 -
Deep Learning 4|用 Python 進行強化學習的開發實作$680$537
相關主題
商品描述
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
- The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
- Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
- The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building
商品描述(中文翻譯)
使用精心設計的事件響應計劃來應對線上安全漏洞,使您的團隊能夠識別攻擊者並了解他們的運作方式。但只有當您以網路威脅情報的思維方式來處理事件響應時,您才能真正理解這些資訊的價值。在這本更新的第二版中,您將學習情報分析的基本原則,以及將這些技術融入事件響應過程的最佳方法。
每種方法相互強化:威脅情報支持並增強事件響應,而事件響應則產生有用的威脅情報。本實用指南幫助事件管理者、惡意軟體分析師、逆向工程師、數位取證專家和情報分析師理解、實施並從這種關係中受益。
本書分為三個部分,內容深入,包括:
- **基本原則:** 介紹網路威脅情報、情報過程、事件響應過程及其如何協同運作
- **實用應用:** 使用 F3EAD 過程(尋找、修復、完成、利用、分析和傳播)逐步了解以情報為驅動的事件響應(IDIR)過程
- **未來之路:** 探索超越個別事件響應調查的 IDIR 大局觀,包括情報團隊的建立