Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $169 MXN al mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs

Idioma
Inglés
Format
Categoría

No ficción

Tags

    Otros también disfrutaron...

    1. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
    2. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
    3. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware Monnappa K A
    4. Digital Forensics and Incident Response - Third Edition: Incident response tools and techniques for effective cyber threat response Gerard Johansen
    5. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit
    6. Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence William Oettinger
    7. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
    8. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana
    9. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    10. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen