LeafKlimaneutrales Unternehmen CoinFaire Preise PackageSchneller und kostenloser Versand ab 14,90 € Bestellwert
Crafting an Information Security Playbook

Crafting an Information Security Playbook

inkl. MwSt. Versandinformationen

Artikel zZt. nicht lieferbar

Artikel zZt. nicht lieferbar

Kurzinformation
Sprache:
Englisch
ISBN:
1491949406
Verlag:
Seitenzahl:
276
Auflage:
-
Erschienen:
2015-05-15
Dieser Artikel steht derzeit nicht zur Verfügung!

Gebrauchte Bücher kaufen

Information
Das Buch befindet sich in einem sehr guten, unbenutzten Zustand.
Information
Das Buch befindet sich in einem sehr guten, gelesenen Zustand. Die Seiten und der Einband sind intakt. Buchrücken/Ecken/Kanten können leichte Gebrauchsspuren aufweisen.
Information
Das Buch befindet sich in einem guten, gelesenen Zustand. Die Seiten und der Einband sind intakt. Buchrücken/Ecken/Kanten können Knicke/Gebrauchsspuren aufweisen.
Information
Das Buch befindet sich in einem lesbaren Zustand. Die Seiten und der Einband sind intakt, jedoch weisen Buchrücken/Ecken/Kanten starke Knicke/Gebrauchsspuren auf. Zusatzmaterialien können fehlen.

Neues Buch oder eBook (pdf) kaufen

Information
Neuware - verlagsfrische aktuelle Buchausgabe.
Natural Handgeprüfte Gebrauchtware
Coins Schnelle Lieferung
Check Faire Preise

inkl. MwSt. Versandinformationen

Artikel zZt. nicht lieferbar

Artikel zZt. nicht lieferbar

Weitere Zahlungsmöglichkeiten  
Zahlungsarten

Beschreibung

Crafting an Information Security Playbook
Security Monitoring and Incident Response Planning

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.* Learn incident response fundamentals—and the importance of getting back to basics* Understand threats you face and what you should be protecting* Collect, mine, organize, and analyze as many relevant data sources as possible* Build your own playbook of repeatable methods for security monitoring and response* Learn how to put your plan into action and keep it running smoothly* Select the right monitoring and detection tools for your environment* Develop queries to help you sort through data and create valuable reports* Know what actions to take during the incident response phase von Bollinger, Jeff und Enright, Brandon und Valites, Matthew

Produktdetails

Einband:
Kartoniert
Seitenzahl:
276
Erschienen:
2015-05-15
Sprache:
Englisch
EAN:
9781491949405
ISBN:
1491949406
Verlag:
Gewicht:
491 g
Auflage:
-
Verwandte Sachgebiete:
Alle gebrauchten Bücher werden von uns handgeprüft.
So garantieren wir Dir zu jeder Zeit Premiumqualität.

Über den Autor

With over ten years of information security experience, Jeff Bollinger has worked as a security architect and incident responder for both academic and corporate networks. Specializing in investigations, network security monitoring, and intrusion detection, Jeff Bollinger currently works as an information security investigator, and has built and operated one of the world's largest corporate security monitoring infrastructures. Jeff regularly speaks at international FIRST conferences, and writes for the Cisco Security Blog. His recent work includes log mining, search optimization, threat research, and security investigations.Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelor's degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates. Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games.Matthew Valites is a senior investigator and site lead on Cisco's Computer Security Incident Response Team (CSIRT). He provides expertise building an Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRT's detection logic, and mobile device hacking. Matt enjoys speaking at international conferences, and is keen to share CSIRT's knowledge, best practices, and lessons-learned.


Entdecke mehr vom Verlag


Neu
50,00 €
Entdecke mehr Gebrauchtes für Dich
frontend/listing/product-box/box-product-slider.tpl
frontend/listing/product-box/box-product-slider.tpl