Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Shelter Island, NY
Manning Publications
[2025]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781633439474/?ar |
Summary: | Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals: formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection. Using this book's downloadable datasets and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. |
Item Description: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 10, 2025) |
Physical Description: | 1 online resource (425 pages) illustrations |
ISBN: | 9781633439474 163343947X 9781638357230 1638357234 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-112157718 | ||
003 | DE-627-1 | ||
005 | 20250306143534.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250204s2025 xx |||||o 00| ||eng c | ||
020 | |a 9781633439474 |c electronic book |9 978-1-63343-947-4 | ||
020 | |a 163343947X |c electronic book |9 1-63343-947-X | ||
020 | |a 9781638357230 |c electronic book |9 978-1-63835-723-0 | ||
020 | |a 1638357234 |c electronic book |9 1-63835-723-4 | ||
035 | |a (DE-627-1)112157718 | ||
035 | |a (DE-599)KEP112157718 | ||
035 | |a (ORHE)9781633439474 | ||
035 | |a (DE-627-1)112157718 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20250122 | |
100 | 1 | |a AlFardan, Nadhem |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber threat hunting |c Nadhem AlFardan ; foreword by Anton Chuvakin |
264 | 1 | |a Shelter Island, NY |b Manning Publications |c [2025] | |
300 | |a 1 online resource (425 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 10, 2025) | ||
520 | |a Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals: formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection. Using this book's downloadable datasets and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. | ||
650 | 0 | |a Cyberterrorism |x Prevention | |
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Chuvakin, Anton |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781633439474 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781633439474 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781633439474/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-112157718 |
---|---|
_version_ | 1833357128560017408 |
adam_text | |
any_adam_object | |
author | AlFardan, Nadhem |
author2 | Chuvakin, Anton |
author2_role | ctb |
author2_variant | a c ac |
author_facet | AlFardan, Nadhem Chuvakin, Anton |
author_role | aut |
author_sort | AlFardan, Nadhem |
author_variant | n a na |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)112157718 (DE-599)KEP112157718 (ORHE)9781633439474 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02253cam a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-112157718</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250306143534.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250204s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633439474</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-63343-947-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">163343947X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-63343-947-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781638357230</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-63835-723-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1638357234</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-63835-723-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)112157718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP112157718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781633439474</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)112157718</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20250122</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">AlFardan, Nadhem</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber threat hunting</subfield><subfield code="c">Nadhem AlFardan ; foreword by Anton Chuvakin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Shelter Island, NY</subfield><subfield code="b">Manning Publications</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (425 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 10, 2025)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals: formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection. Using this book's downloadable datasets and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chuvakin, Anton</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781633439474</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781633439474</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781633439474/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-112157718 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:46Z |
institution | BVB |
isbn | 9781633439474 163343947X 9781638357230 1638357234 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (425 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Manning Publications |
record_format | marc |
spelling | AlFardan, Nadhem VerfasserIn aut Cyber threat hunting Nadhem AlFardan ; foreword by Anton Chuvakin Shelter Island, NY Manning Publications [2025] 1 online resource (425 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on February 10, 2025) Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals: formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection. Using this book's downloadable datasets and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. Cyberterrorism Prevention Computer security Sécurité informatique Chuvakin, Anton MitwirkendeR ctb 9781633439474 Erscheint auch als Druck-Ausgabe 9781633439474 |
spellingShingle | AlFardan, Nadhem Cyber threat hunting Cyberterrorism Prevention Computer security Sécurité informatique |
title | Cyber threat hunting |
title_auth | Cyber threat hunting |
title_exact_search | Cyber threat hunting |
title_full | Cyber threat hunting Nadhem AlFardan ; foreword by Anton Chuvakin |
title_fullStr | Cyber threat hunting Nadhem AlFardan ; foreword by Anton Chuvakin |
title_full_unstemmed | Cyber threat hunting Nadhem AlFardan ; foreword by Anton Chuvakin |
title_short | Cyber threat hunting |
title_sort | cyber threat hunting |
topic | Cyberterrorism Prevention Computer security Sécurité informatique |
topic_facet | Cyberterrorism Prevention Computer security Sécurité informatique |
work_keys_str_mv | AT alfardannadhem cyberthreathunting AT chuvakinanton cyberthreathunting |