Effective Threat Investigation for SOC Analysts : The ultimate guide to examining various threats and attacker techniques using security logs
Enregistré dans:
Auteur principal: | Yahia, Mostafa. (Auteur) |
---|---|
Support: | E-Book |
Langue: | Anglais |
Publié: |
Birmingham :
Packt Publishing.
|
Autres localisations: | Voir dans le Sudoc |
Accès en ligne: | Accès à l'E-book |
Documents similaires
-
Building a Next-Gen SOC with IBM QRadar : Accelerate your security operations and detect cyber threats effectively
par: Kothekar, Ashish M.. -
The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs
par: Maurice, Chad.
Publié: 2022 -
Threats to the arctic
par: Elias, Scott A..
Publié: 2021 -
Practical Cyber Threat Intelligence : Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices
par: Ozkaya, Erdal. -
Practical Threat Intelligence and Data-Driven Threat Hunting : A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
par: Palacin, Valentina.
Publié: 2020