買這商品的人也買了...
-
$281C++黑客編程揭秘與防範(第2版)
-
$580$458 -
$1,840$1,748 -
$520$406 -
$690$538 -
$1,750$1,663 -
$620$490 -
$2865G 與車聯網 — 基於移動通信的車聯網技術與智能網聯汽車
-
$3525G時代:什麼是5G,它將如何改變世界
-
$780$663 -
$2,200$2,090 -
$2,100$1,989 -
$446推薦系統
-
$780$663 -
$360$284 -
$880$748 -
$1,520$1,444 -
$880$748 -
$653客戶留存數據分析與預測
-
$1,580$1,501 -
$650$507 -
$2,200$2,090 -
$880$695 -
$750$593 -
$680$537
相關主題
商品描述
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
- The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
- Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
- The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building
商品描述(中文翻譯)
在線安全遭受入侵後,使用一個周密的事件應對計劃可以幫助您的團隊識別攻擊者並了解他們的操作方式。但只有當您以網絡威脅情報的思維方式來處理事件應對時,您才能真正理解這些信息的價值。在這本更新的第二版中,您將學習情報分析的基本原理,以及將這些技術應用於事件應對過程的最佳方法。
每種方法都相互補充:威脅情報支持並增強事件應對,而事件應對則產生有用的威脅情報。這本實用指南幫助事件經理、惡意軟件分析師、逆向工程師、數字取證專家和情報分析師理解、實施和從這種關係中受益。
這本深入的書籍分為三個部分,包括:
- 基礎知識:介紹網絡威脅情報、情報處理過程、事件應對過程以及它們之間的相互作用。
- 實際應用:使用F3EAD過程(查找、修復、結束、利用、分析和傳播)來進行基於情報的事件應對(IDIR)過程。
- 未來發展:探索超越個別事件應對調查的IDIR的大局方面,包括情報團隊建設。