
On the Edge of Time
Here there be dragons. On the edge of time, in the wicked twists of wyrmhole space, wyrmdragons pre
Uncategorized Jeff Bollinger, Brandon Enright, Matthew Valites 53 29th Jun, 2016
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.