買這商品的人也買了...
-
$281C++黑客編程揭秘與防範(第2版)
-
$580$458 -
$1,840$1,748 -
$520$406 -
$690$538 -
$1,750$1,663 -
$620$490 -
$2865G 與車聯網 — 基於移動通信的車聯網技術與智能網聯汽車
-
$3525G時代:什麼是5G,它將如何改變世界
-
$780$390 -
$2,200$2,090 -
$2,100Deep Learning from Scratch
-
$469推薦系統
-
$780$616 -
$360$284 -
$880$695 -
$1,580$1,501 -
$880$695 -
$768$730 -
$1,580$1,501 -
$650$507 -
$2,200$2,090 -
$880$695 -
$750$593 -
$680$537
商品描述
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process.
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.
In three parts, this in-depth book includes:
- The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
- Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
- The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building
商品描述(中文翻譯)
使用精心設計的事件響應計劃來應對線上安全漏洞,使您的團隊能夠識別攻擊者並了解他們的運作方式。但只有當您以網路威脅情報的思維方式來處理事件響應時,您才能真正理解這些資訊的價值。在這本更新的第二版中,您將學習情報分析的基本原則,以及將這些技術融入事件響應過程的最佳方法。
每種方法相互強化:威脅情報支持並增強事件響應,而事件響應則產生有用的威脅情報。本實用指南幫助事件管理者、惡意軟體分析師、逆向工程師、數位取證專家和情報分析師理解、實施並從這種關係中受益。
本書分為三個部分,內容深入,包括:
- **基本原則:** 介紹網路威脅情報、情報過程、事件響應過程及其如何協同運作
- **實用應用:** 使用 F3EAD 過程(尋找、修復、完成、利用、分析和傳播)逐步了解以情報為驅動的事件響應(IDIR)過程
- **未來之路:** 探索超越個別事件響應調查的 IDIR 大局觀,包括情報團隊的建立