Item Infomation
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Roberts, Scott J | - |
dc.contributor.author | Rebekah Brown | - |
dc.date.accessioned | 2024-07-23T02:06:53Z | - |
dc.date.available | 2024-07-23T02:06:53Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | http://thuvienso.thanglong.edu.vn//handle/TLU/10352 | - |
dc.description.abstract | The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building | vi |
dc.format.extent | 346 pages | vi |
dc.language.iso | en | vi |
dc.publisher | O’Reilly Media, Inc | vi |
dc.subject | Computer crimes | vi |
dc.subject | Computer security | vi |
dc.subject | Không gian mạng | vi |
dc.subject | Mạng máy tính | vi |
dc.title | Intelligence-driven incident response : outwitting the adversary | vi |
dc.type | Sách/Book | vi |
Appears in Collections | Tin học |
Files in This Item: