Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder(Paperback)
暫譯: 藍隊手冊:事件回應版:網路安全事件回應者的精簡實地指南(平裝本)
Don Murdoch GSE
- 出版商: CreateSpace Independ
- 出版日期: 2014-08-03
- 售價: $760
- 貴賓價: 9.5 折 $722
- 語言: 英文
- 頁數: 164
- 裝訂: Paperback
- ISBN: 1500734756
- ISBN-13: 9781500734756
-
相關分類:
資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$1,400$1,330 -
$1,862Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)
-
$580$383 -
$650$429 -
$505Linux 防火牆, 4/e (Linux Firewalls: Enhancing Security with nftables and Beyond, 4/e)
-
$699$552 -
$380$323 -
$580$458 -
$480$379 -
$699$594 -
$1,340$1,273 -
$880$695 -
$1,040$988 -
$2,480$2,356 -
$580$568 -
$1,500$1,425 -
$505深入剖析 Kubernetes
-
$580$458 -
$880$616 -
$700$553 -
$680$537 -
$250$197 -
$2,600$2,470 -
$780$608 -
$360$284
相關主題
商品描述
Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections.
The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics. The book is peppered with practical real life techniques from the authors extensive career working in academia and a corporate setting. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server – this book should help you handle the case and teach you some new techniques along the way.
Version 2.0 updates:
- *** A new section on Database incident response was added.
- *** A new section on Chain of Custody was added.
- *** Matt Baxter's superbly formatted protocol headers were added!
- Table headers bolded.
- Table format slightly revised throughout book to improve left column readability.
- Several sentences updated and expanded for readability and completeness.
- A few spelling errors were corrected.
- Several sites added to the Web References section.
- Illustrations reformatted for better fit on the page.
- An index was added.
- Attribution for some content made more clear (footnotes, expanded source citing)
- Content expanded a total of 20 pages
The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics. The book is peppered with practical real life techniques from the authors extensive career working in academia and a corporate setting. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server – this book should help you handle the case and teach you some new techniques along the way.
Version 2.0 updates:
- *** A new section on Database incident response was added.
- *** A new section on Chain of Custody was added.
- *** Matt Baxter's superbly formatted protocol headers were added!
- Table headers bolded.
- Table format slightly revised throughout book to improve left column readability.
- Several sentences updated and expanded for readability and completeness.
- A few spelling errors were corrected.
- Several sites added to the Web References section.
- Illustrations reformatted for better fit on the page.
- An index was added.
- Attribution for some content made more clear (footnotes, expanded source citing)
- Content expanded a total of 20 pages
商品描述(中文翻譯)
更新、擴充,並於 2014 年 10 月 5 日發行印刷版!完整細節如下!新增兩個章節、五個協議標頭插圖、改善格式及其他修正。
《藍隊手冊》是針對網路安全事件響應者和資訊安全專業人士的無冗餘參考指南。《藍隊手冊》以簡明的手冊格式包含了有關事件響應過程、攻擊者的工作方式、常見工具、經過 12 年發展的網路分析方法、Windows 和 Linux 分析過程、tcpdump 使用範例、Snort IDS 使用等多個主題的基本資訊。這本書中充滿了作者在學術界和企業環境中廣泛職業生涯中的實用現實技術。無論您是在撰寫案例筆記、分析潛在可疑流量,還是被召喚來檢查一台表現不佳的伺服器——這本書都應該能幫助您處理案件並教您一些新的技術。
版本 2.0 更新:
- *** 新增了一個有關資料庫事件響應的章節。
- *** 新增了一個有關證據保管鏈的章節。
- *** 新增了 Matt Baxter 精心格式化的協議標頭!
- 表格標題加粗。
- 全書的表格格式稍作修訂,以改善左側欄的可讀性。
- 幾個句子已更新和擴充,以提高可讀性和完整性。
- 修正了一些拼寫錯誤。
- 在網路參考部分新增了幾個網站。
- 插圖重新格式化以更好地適應頁面。
- 新增了索引。
- 對某些內容的歸屬做了更清晰的說明(腳註、擴展來源引用)。
- 內容總共擴充了 20 頁。