Return to home page
Searching: Muskingum library catalog
While many OPAL libraries have resumed lending and borrowing, some continue to operate at reduced service levels or limit in-person use to their campus community. Note that pickup services and procedures may differ between libraries. Please contact your library regarding open hours, pickup procedures, specific requests, or other assistance.

LEADER 00000cam  2200613Ii 4500 
001    910341774 
003    OCoLC 
005    20201009145548.9 
006    m     o  d         
007    cr unu|||||||| 
008    150529s2015    caua    o     001 0 eng d 
019    968035071|a968975495 
020    1491949406 
020    9781491949405 
020    9781491913604 
020    1491913606 
020    |z9781491949405 
035    (OCoLC)910341774|z(OCoLC)968035071|z(OCoLC)968975495 
037    CL0500000597|bSafari Books Online 
040    UMI|beng|erda|epn|cUMI|dCUS|dOCLCO|dDEBBG|dOCLCF|dDEBSZ
       |dFEM|dOCLCA|dCEF|dOCLCQ|dU3G|dUAB|dUKAHL 
049    MAIN 
050  4 QA76.9.A25 
082 04 005.8|223 
100 1  Bollinger, Jeff,|eauthor. 
245 10 Crafting the InfoSec playbook /|cJeff Bollinger, Brandon 
       Enright & Matthew Valites. 
250    First edition. 
264  1 Sebastopol, CA :|bO'Reilly Media, Inc.,|c[2015] 
264  4 |c2015 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|2rda 
500    Includes index. 
520    Any good attacker will tell you that expensive security 
       monitoring and prevention tools aren't enough to keep you 
       secure. This practical book demonstrates a data-centric 
       approach to distilling complex security monitoring, 
       incident response, and threat analysis ideas into their 
       most basic elements. You'll learn how to develop your own 
       threat intelligence and incident detection strategy, 
       rather than depend on security tools alone. Written by 
       members of Cisco's Computer Security Incident Response 
       Team, this book shows IT and information security 
       professionals how to create an InfoSec playbook by 
       developing strategy, technique, and architecture. Learn 
       incident response fundamentals--and the importance of 
       getting back to basics Understand threats you face and 
       what you should be protecting Collect, mine, organize, and
       analyze as many relevant data sources as possible Build 
       your own playbook of repeatable methods for security 
       monitoring and response Learn how to put your plan into 
       action and keep it running smoothly Select the right 
       monitoring and detection tools for your environment 
       Develop queries to help you sort through data and create 
       valuable reports Know what actions to take during the 
       incident response phase. 
588 0  Print version record. 
650  0 Computer security. 
650  0 Data encryption (Computer science) 
650  7 Computer security.|2fast|0(OCoLC)fst00872484 
650  7 Data encryption (Computer science)|2fast
       |0(OCoLC)fst00887935 
700 1  Enright, Brandon,|eauthor. 
700 1  Valites, Matthew,|eauthor. 
776 08 |iPrint version:|aBollinger, Jeff.|tCrafting the InfoSec 
       playbook.|bFirst edition|z9781491913611|w(OCoLC)908685807 
990    ProQuest Safari|bO'Reilly Online Learning: Academic/Public
       Library Edition|c2020-10-09|yKB collection name change
       |5OH1 
990    ProQuest Safari|bO'Reilly Safari Learning Platform: 
       Academic edition|c2018-10-22|yNew collection 
       ProQuest.ormac|5OH1 
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SAFARI EBOOKS    ONLINE  
View online

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team