Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Prøv gratis
DK - Details page - Device banner - 894x1036

The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs

Sprog
Engelsk
Format
Kategori

Fakta

Tags

    Andre kan også lide...

    1. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
    2. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
    3. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware Monnappa K A
    4. Digital Forensics and Incident Response - Third Edition: Incident response tools and techniques for effective cyber threat response Gerard Johansen
    5. Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit
    6. Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence William Oettinger
    7. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
    8. An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana
    9. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    10. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen