Sách/BookAuthors: Rebekah Brown (2023)
The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together
Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate
The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building