Item Infomation

Full metadata record
DC FieldValueLanguage
dc.contributorRoberts, Scott J-
dc.contributor.authorRebekah Brown-
dc.date.accessioned2024-07-23T02:06:53Z-
dc.date.available2024-07-23T02:06:53Z-
dc.date.issued2023-
dc.identifier.urihttp://thuvienso.thanglong.edu.vn//handle/TLU/10352-
dc.description.abstractThe fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team buildingvi
dc.format.extent346 pagesvi
dc.language.isoenvi
dc.publisherO’Reilly Media, Incvi
dc.subjectComputer crimesvi
dc.subjectComputer securityvi
dc.subjectKhông gian mạngvi
dc.subjectMạng máy tínhvi
dc.titleIntelligence-driven incident response : outwitting the adversaryvi
dc.typeSách/Bookvi
Appears in CollectionsTin học

Files in This Item: