Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Sebastopol, CA
O'Reilly Media
[2018]
|
Edition: | First edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781492028260/?ar |
Summary: | Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques. |
Item Description: | Includes bibliographical references. - Online resource; title from title page (Safari, viewed January 8, 2019) |
Physical Description: | 1 online resource (1 volume) illustrations |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047626631 | ||
003 | DE-627-1 | ||
005 | 20240228120630.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047626631 | ||
035 | |a (DE-599)KEP047626631 | ||
035 | |a (ORHE)9781492028260 | ||
035 | |a (DE-627-1)047626631 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Collins, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Threat hunting |b a guide to proactive network defense |c Michael Collins |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed January 8, 2019) | ||
520 | |a Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Hackers | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492028260/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047626631 |
---|---|
_version_ | 1833357077155676160 |
adam_text | |
any_adam_object | |
author | Collins, Michael |
author_facet | Collins, Michael |
author_role | aut |
author_sort | Collins, Michael |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047626631 (DE-599)KEP047626631 (ORHE)9781492028260 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02832cam a22004452c 4500</leader><controlfield tag="001">ZDB-30-ORH-047626631</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120630.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047626631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047626631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492028260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047626631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat hunting</subfield><subfield code="b">a guide to proactive network defense</subfield><subfield code="c">Michael Collins</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed January 8, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492028260/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047626631 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:57Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Collins, Michael VerfasserIn aut Threat hunting a guide to proactive network defense Michael Collins First edition. Sebastopol, CA O'Reilly Media [2018] ©2018 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed January 8, 2019) Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective threat hunting program and evaluate the results. Author Michael Collins, chief scientist for the network security and data analysis company RedJack in Washington, DC, explains why threat hunting is an ideal support for your existing security operations center. With both architecture and attacks constantly changing, proactive threat hunting will help security analysts and security managers discover how your company's assets really work. Learn about the process, goals, and benefits of threat hunting Examine your organization's readiness for threat hunting, including the resources, data, and personnel you need Delve into the process using a typical threat hunting workflow Get a brief encyclopedia of threat hunting techniques, including core concepts and situational awareness Explore resources for additional threat hunting strategies and techniques. Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
spellingShingle | Collins, Michael Threat hunting a guide to proactive network defense Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
title | Threat hunting a guide to proactive network defense |
title_auth | Threat hunting a guide to proactive network defense |
title_exact_search | Threat hunting a guide to proactive network defense |
title_full | Threat hunting a guide to proactive network defense Michael Collins |
title_fullStr | Threat hunting a guide to proactive network defense Michael Collins |
title_full_unstemmed | Threat hunting a guide to proactive network defense Michael Collins |
title_short | Threat hunting |
title_sort | threat hunting a guide to proactive network defense |
title_sub | a guide to proactive network defense |
topic | Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Hackers Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Pirates informatiques Computer networks ; Security measures |
work_keys_str_mv | AT collinsmichael threathuntingaguidetoproactivenetworkdefense |