Descriere YEO:
Pe YEO găsești Crafting the Infosec Playbook: Security de la O\'Reilly Media, în categoria Foreign Books.
Indiferent de nevoile tale, Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan, Paperback/Jeff Bollinger din categoria Foreign Books îți poate aduce un echilibru perfect între calitate și preț, cu avantaje practice și moderne.
Preț: 244.99 Lei
Caracteristicile produsului Crafting the Infosec Playbook: Security
- Brand: O\'Reilly Media
- Categoria: Foreign Books
- Magazin: elefant.ro
- Ultima actualizare: 08-12-2024 01:33:56
Comandă Crafting the Infosec Playbook: Security Online, Simplu și Rapid
Prin intermediul platformei YEO, poți comanda Crafting the Infosec Playbook: Security de la elefant.ro rapid și în siguranță. Bucură-te de o experiență de cumpărături online optimizată și descoperă cele mai bune oferte actualizate constant.
Descriere magazin:
Any good attacker will tell you that expensive security monitoring and prevention tools aren\'t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You\'ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco\'s Computer
Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals--and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase About the Author: With over ten years of information security experience,
Jeff Bollinger has worked as a security architect and incident responder for both academic and corporate networks. Specializing in investigations, network security monitoring, and intrusion detection,
Jeff Bollinger currently works as an information security investigator, and has built and operated one of the world\'s largest corporate security monitoring infrastructures.
Jeff regularly speaks at international FIRST conferences, and writes for the Cisco
Security Blog. His recent work includes log mining, search optimization, threat research, and security investigations. Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelor\'s degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates. Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games. Matthew Valites is a senior investigator and site lead on Cisco\'s Computer
Security Incident Response Team (CSIRT). He provides expertise building an
Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRT\'s detection logic, and mobile device hacking. Matt enjoys speaking at international conferences, and is keen to share CSIRT\'s knowledge, best practices, and lessons-learned.