×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

(ebook) (audiobook) (audiobook) Książka w języku 1
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - okladka książki

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - okladka książki

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - audiobook MP3

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - audiobook CD

Autorzy:
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Serie wydawnicze:
Learning
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
244
Dostępne formaty:
     PDF
     ePub
Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets, in line with the current threat landscape.
The book begins by introducing you to modern sophisticated cyberattacks, including threat actors, methods, and motivations. Then, the phases of efficient incident response are linked to the attack's life cycle using a unified cyber kill chain. As you advance, you'll explore various types of Windows-based platform endpoint forensic evidence and the arsenal necessary to gain full visibility of the Windows infrastructure. The concluding chapters discuss the best practices in the threat hunting process, along with proactive approaches that you can take to discover cybersecurity incidents before they reach their final stage.
By the end of this book, you’ll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment.

Wybrane bestsellery

O autorach książki

Anatolii Tykushin is the Head of DFIR Team at GROUP-IB MEA. He has over 7 years of extensive experience in Incident Response, digital forensics on Windows and Linux platforms, web applications, Python programming, scripting languages (PowerShell, Unix Shell, CMD), cloud forensics, cyber threat research, DevOps, system administration, virtualization, threat hunting, and consulting customers globally. He enjoys sharing his knowledge and mentoring passionate individuals to make cyberspace a little safer.
Svetlana Ostrovskaya is a Principal DFIR Consultant at Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. Besides active involvement in incident response engagements, Svetlana has extensive training experience in various regions, including Russia, CIS, MEA, Europe, APAC. She has co-authored articles on information security and computer forensics, as well as a number of training programs, including Windows Memory Forensics, Linux Forensics, Advanced Windows Forensic Investigations, and Windows Incident Response and Threat Hunting.

Zobacz pozostałe książki z serii Learning

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
98,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.