While many OPAL libraries have resumed lending and borrowing, some continue to operate at reduced service levels or limit in-person use to their campus community. Note that pickup services and procedures may differ between libraries. Please contact your library
regarding open hours, pickup procedures, specific requests, or other assistance.
LEADER 00000cam 2200613Ii 4500
006 m o d
007 cr unu||||||||
008 150529s2015 caua o 001 0 eng d
037 CL0500000597|bSafari Books Online
050 4 QA76.9.A25
082 04 005.8|223
100 1 Bollinger, Jeff,|eauthor.
245 10 Crafting the InfoSec playbook /|cJeff Bollinger, Brandon
Enright & Matthew Valites.
250 First edition.
264 1 Sebastopol, CA :|bO'Reilly Media, Inc.,|c
264 4 |c2015
300 1 online resource (1 volume) :|billustrations
338 online resource|bcr|2rdacarrier
347 text file|2rda
500 Includes index.
520 Any good attacker will tell you that expensive security
monitoring and prevention tools aren't enough to keep you
secure. This practical book demonstrates a data-centric
approach to distilling complex security monitoring,
incident response, and threat analysis ideas into their
most basic elements. You'll learn how to develop your own
threat intelligence and incident detection strategy,
rather than depend on security tools alone. Written by
members of Cisco's Computer Security Incident Response
Team, this book shows IT and information security
professionals how to create an InfoSec playbook by
developing strategy, technique, and architecture. Learn
incident response fundamentals--and the importance of
getting back to basics Understand threats you face and
what you should be protecting Collect, mine, organize, and
analyze as many relevant data sources as possible Build
your own playbook of repeatable methods for security
monitoring and response Learn how to put your plan into
action and keep it running smoothly Select the right
monitoring and detection tools for your environment
Develop queries to help you sort through data and create
valuable reports Know what actions to take during the
incident response phase.
588 0 Print version record.
650 0 Computer security.
650 0 Data encryption (Computer science)
650 7 Computer security.|2fast|0(OCoLC)fst00872484
650 7 Data encryption (Computer science)|2fast
700 1 Enright, Brandon,|eauthor.
700 1 Valites, Matthew,|eauthor.
776 08 |iPrint version:|aBollinger, Jeff.|tCrafting the InfoSec
990 ProQuest Safari|bO'Reilly Online Learning: Academic/Public
Library Edition|c2020-10-09|yKB collection name change
990 ProQuest Safari|bO'Reilly Safari Learning Platform:
Academic edition|c2018-10-22|yNew collection