The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs
Enregistré dans:
Auteur principal: | Maurice, Chad. (Auteur) |
---|---|
Autres auteurs: | Thompson, Jeremy. (Auteur), Copeland, William. |
Support: | E-Book |
Langue: | Anglais |
Publié: |
Birmingham :
Packt Publishing,
2022.
|
Autres localisations: | Voir dans le Sudoc |
Accès en ligne: | Accès à l'E-book |
Documents similaires
-
Practical Threat Intelligence and Data-Driven Threat Hunting : A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
par: Palacin, Valentina.
Publié: 2020 -
Threat Hunting with Elastic Stack : Solve complex security challenges with integrated prevention, detection, and response
par: Pease, Andrew.
Publié: 2021 -
Incident Response with Threat Intelligence : Practical insights into developing an incident response capability through intelligence-based threat hunting
par: Martinez, Roberto.
Publié: 2022 -
Good Will Hunting = Will Hunting
par: Van Sant, Gus, 1952-
Publié: 2011 -
Operationalizing Threat Intelligence : A guide to developing and operationalizing cyber threat intelligence programs
par: Wilhoit, Kyle.
Publié: 2022