This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements, and helps you develop your own threat intelligence and incident detection strategy.
Twitter: @oreillymedia facebook.com/oreilly Any good attacker will tell you that expensive security monitoring and prevention tools arenโt enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.