Operationalizing Threat Intelligence : A guide to developing and operationalizing cyber threat intelligence programs
Enregistré dans:
Auteur principal: | Wilhoit, Kyle. (Auteur) |
---|---|
Autres auteurs: | Opacki, Joseph. (Auteur) |
Support: | E-Book |
Langue: | Anglais |
Publié: |
Birmingham :
Packt Publishing,
2022.
|
Autres localisations: | Voir dans le Sudoc |
Accès en ligne: | Accès à l'E-book |
Documents similaires
-
Practical Cyber Threat Intelligence : Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices
par: Ozkaya, Erdal. -
Incident Response with Threat Intelligence : Practical insights into developing an incident response capability through intelligence-based threat hunting
par: Martinez, Roberto.
Publié: 2022 -
Practical Threat Intelligence and Data-Driven Threat Hunting : A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
par: Palacin, Valentina.
Publié: 2020 -
Operationalizing Machine Learning Pipelines : Building Reusable and Reproducible Machine Learning Pipelines Using MLOps
par: Pandey, Vishwajyoti.
Publié: 2022 -
The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs
par: Maurice, Chad.
Publié: 2022