Get Free Shipping on orders over $79
Crafting the InfoSec Playbook : Security Monitoring and Incident Response Master Plan - Jeff Bollinger

Crafting the InfoSec Playbook

Security Monitoring and Incident Response Master Plan

By: Jeff Bollinger, Brandon Enright, Matthew Valites

eText | 7 May 2015 | Edition Number 1

At a Glance

eText


$53.89

or 4 interest-free payments of $13.47 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.

  • Learn incident response fundamentals—and the importance of getting back to basics
  • Understand threats you face and what you should be protecting
  • Collect, mine, organize, and analyze as many relevant data sources as possible
  • Build your own playbook of repeatable methods for security monitoring and response
  • Learn how to put your plan into action and keep it running smoothly
  • Select the right monitoring and detection tools for your environment
  • Develop queries to help you sort through data and create valuable reports
  • Know what actions to take during the incident response phase
on
Desktop
Tablet
Mobile

More in Data Encryption

Scam : Inside Southeast Asia's Cybercrime Compounds - Ivan Franceschini

eBOOK