Incident Response With Threat Intelligence
Description
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization. Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules. By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
More Details
Contributors:
ISBN:
9781801070997
Reviews from GoodReads
Loading GoodReads Reviews.
Staff View
Grouping Information
Grouped Work ID | 465a5062-9865-8076-2e7c-abb3490f665d |
---|---|
Grouping Title | incident response with threat intelligence |
Grouping Author | roberto martinez |
Grouping Category | book |
Grouping Language | English (eng) |
Last Grouping Update | 2025-05-02 22:24:25PM |
Last Indexed | 2025-05-14 23:44:05PM |
Solr Fields
accelerated_reader_point_value
0
accelerated_reader_reading_level
0
author
Martinez, Roberto
author2-role
hoopla digital
author_display
Martinez, Roberto
display_description
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization. Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules. By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
format_category_gu
eBook
format_gu
eBook
id
465a5062-9865-8076-2e7c-abb3490f665d
isbn
9781801070997
last_indexed
2025-05-15T05:44:05.174Z
lexile_score
-1
literary_form
Non Fiction
literary_form_full
Non Fiction
local_time_since_added_gu
2 Months
Month
Quarter
Six Months
Year
Month
Quarter
Six Months
Year
primary_isbn
9781801070997
publishDate
2022
publisher
Packt Publishing
recordtype
grouped_work
subject_facet
Computer networks -- Security measures
Computer security
Computers
Cryptography
Electronic books
Internet
Internet -- Safety measures
Computer security
Computers
Cryptography
Electronic books
Internet
Internet -- Safety measures
title_display
Incident Response With Threat Intelligence
title_full
Incident Response With Threat Intelligence [electronic resource] / Roberto Martinez
title_short
Incident Response With Threat Intelligence
topic_facet
Computer networks
Computer security
Computers
Cryptography
Electronic books
Internet
Safety measures
Security measures
Computer security
Computers
Cryptography
Electronic books
Internet
Safety measures
Security measures
Solr Details Tables
item_details
Bib Id | Item Id | Shelf Location | Call Num | Format | Format Category | Num Copies | Is Order Item | Is eContent | eContent Source | eContent URL | Detailed Status | Last Checkin | Location |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hoopla:MWT17581936 | Online Hoopla Collection | Online Hoopla | eBook | eBook | 1 | false | true | Hoopla | https://www.hoopladigital.com/title/17581936?utm_source=MARC&Lid=hh4435 | Available Online |
record_details
Bib Id | Format | Format Category | Edition | Language | Publisher | Publication Date | Physical Description | Abridged |
---|---|---|---|---|---|---|---|---|
hoopla:MWT17581936 | eBook | eBook | English | Packt Publishing | 2022 | 1 online resource (468 pages) |
scoping_details_gu
Bib Id | Item Id | Grouped Status | Status | Locally Owned | Available | Holdable | Bookable | In Library Use Only | Library Owned | Is Home Pick Up Only | Holdable PTypes | Bookable PTypes | Home Pick Up PTypes | Local Url |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hoopla:MWT17581936 | Available Online | Available Online | false | true | false | false | false | false | false |