ODBIERZ TWÓJ BONUS :: »

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Język publikacji: 1
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - okladka książki

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov - okladka książki

Autorzy:
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Serie wydawnicze:
Learning
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
244
Dostępne formaty:
     PDF
     ePub

Ebook 29,90 zł najniższa cena z 30 dni

109,00 zł (-10%)
98,10 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

29,90 zł najniższa cena z 30 dni

Poleć tę książkę znajomemu Poleć tę książkę znajomemu!!

Przenieś na półkę

Do przechowalni

Prezent last minute w ebookpoint.pl
Zostało Ci na świąteczne zamówienie opcje wysyłki »
Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets, in line with the current threat landscape.
The book begins by introducing you to modern sophisticated cyberattacks, including threat actors, methods, and motivations. Then, the phases of efficient incident response are linked to the attack's life cycle using a unified cyber kill chain. As you advance, you'll explore various types of Windows-based platform endpoint forensic evidence and the arsenal necessary to gain full visibility of the Windows infrastructure. The concluding chapters discuss the best practices in the threat hunting process, along with proactive approaches that you can take to discover cybersecurity incidents before they reach their final stage.
By the end of this book, you’ll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment.

Wybrane bestsellery

O autorach książki

Anatolii Tykushin is the Head of DFIR Team at GROUP-IB MEA. He has over 7 years of extensive experience in Incident Response, digital forensics on Windows and Linux platforms, web applications, Python programming, scripting languages (PowerShell, Unix Shell, CMD), cloud forensics, cyber threat research, DevOps, system administration, virtualization, threat hunting, and consulting customers globally. He enjoys sharing his knowledge and mentoring passionate individuals to make cyberspace a little safer.
Svetlana Ostrovskaya is a Principal DFIR Consultant at Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. Besides active involvement in incident response engagements, Svetlana has extensive training experience in various regions, including Russia, CIS, MEA, Europe, APAC. She has co-authored articles on information security and computer forensics, as well as a number of training programs, including Windows Memory Forensics, Linux Forensics, Advanced Windows Forensic Investigations, and Windows Incident Response and Threat Hunting.

Zobacz pozostałe książki z serii Learning

Packt Publishing - inne książki

Zamknij

Przenieś na półkę
Dodano produkt na półkę
Usunięto produkt z półki
Przeniesiono produkt do archiwum
Przeniesiono produkt do biblioteki

Zamknij

Wybierz metodę płatności

Ebook
98,10 zł
Dodaj do koszyka
Sposób płatności
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.