16 125 881 książek w 175 językach
Jednak się nie przyda? Nic nie szkodzi! U nas możesz zwrócić towar do 30 dni
Bon prezentowy to zawsze dobry pomysł. Obdarowany może za bon prezentowy wybrać cokolwiek z naszej oferty.
30 dni na zwrot towaru
This book demonstrates how to boil down complex security monitoring and incident response ideas into their most basic elements. Using a data-centric approach, the authors share how to create your own unique incident detection strategy, how to keep your ideas and methods fresh, how to discover and develop your own threat intelligence, how to get the most out of participating in the security community, and how to compete against the malicious actors already attacking your network.§§Most Information Security books tend to fall into the same trap of spending page after page describing how to configure open-source security software packages, or drone on about various configuration options replete with screenshots. This book focuses on strategy and technique, and is intended to give those in the know - as well as those just getting started - practical advice and examples of not just how to install and configure tools, but how to strategically use them in real-world settings.