|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Build your organization's cyber defense system by effectively
applying digital forensics, incident management, and investigation
techniques to real-world cyber threats Key Features Create a solid
incident response framework and manage cyber incidents effectively
Learn to apply digital forensics tools and techniques to
investigate cyber threats Explore the real-world threat of
ransomware and apply proper incident response techniques for
investigation and recovery Book DescriptionAn understanding of how
digital forensics integrates with the overall response to
cybersecurity incidents is key to securing your organization's
infrastructure from attacks. This updated third edition will help
you perform cutting-edge digital forensic activities and incident
response with a new focus on responding to ransomware attacks.
After covering the fundamentals of incident response that are
critical to any information security team, you'll explore incident
response frameworks. From understanding their importance to
creating a swift and effective response to security incidents, the
book will guide you using examples. Later, you'll cover digital
forensic techniques, from acquiring evidence and examining volatile
memory through to hard drive examination and network-based
evidence. You'll be able to apply these techniques to the current
threat of ransomware. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
be able to investigate and report unwanted security breaches and
incidents in your organization. What you will learn Create and
deploy an incident response capability within your own organization
Perform proper evidence acquisition and handling Analyze the
evidence collected and determine the root cause of a security
incident Integrate digital forensic techniques and procedures into
the overall incident response process Understand different
techniques for threat hunting Write incident reports that document
the key findings of your analysis Apply incident response practices
to ransomware attacks Leverage cyber threat intelligence to augment
digital forensics findings Who this book is forThis book is for
cybersecurity and information security professionals who want to
implement digital forensics and incident response in their
organizations. You'll also find the book helpful if you're new to
the concept of digital forensics and looking to get started with
the fundamentals. A basic understanding of operating systems and
some knowledge of networking fundamentals are required to get
started with this book.
Leverage cyber threat intelligence and the MITRE framework to
enhance your prevention mechanisms, detection capabilities, and
learn top adversarial simulation and emulation techniques Key
Features Apply real-world strategies to strengthen the capabilities
of your organization's security system Learn to not only defend
your system but also think from an attacker's perspective Ensure
the ultimate effectiveness of an organization's red and blue teams
with practical tips Book DescriptionWith small to large companies
focusing on hardening their security systems, the term "purple
team" has gained a lot of traction over the last couple of years.
Purple teams represent a group of individuals responsible for
securing an organization's environment using both red team and blue
team testing and integration - if you're ready to join or advance
their ranks, then this book is for you. Purple Team Strategies will
get you up and running with the exact strategies and techniques
used by purple teamers to implement and then maintain a robust
environment. You'll start with planning and prioritizing adversary
emulation, and explore concepts around building a purple team
infrastructure as well as simulating and defending against the most
trendy ATT&CK tactics. You'll also dive into performing
assessments and continuous testing with breach and attack
simulations. Once you've covered the fundamentals, you'll also
learn tips and tricks to improve the overall maturity of your
purple teaming capabilities along with measuring success with KPIs
and reporting. With the help of real-world use cases and examples,
by the end of this book, you'll be able to integrate the best of
both sides: red team tactics and blue team security measures. What
you will learn Learn and implement the generic purple teaming
process Use cloud environments for assessment and automation
Integrate cyber threat intelligence as a process Configure traps
inside the network to detect attackers Improve red and blue team
collaboration with existing and new tools Perform assessments of
your existing security controls Who this book is forIf you're a
cybersecurity analyst, SOC engineer, security leader or strategist,
or simply interested in learning about cyber attack and defense
strategies, then this book is for you. Purple team members and
chief information security officers (CISOs) looking at securing
their organizations from adversaries will also benefit from this
book. You'll need some basic knowledge of Windows and Linux
operating systems along with a fair understanding of networking
concepts before you can jump in, while ethical hacking and
penetration testing know-how will help you get the most out of this
book.
This book is about cyber security. In Part 1, the author discusses
his thoughts on the cyber security industry and how those that
operate within it should approach their role with the mindset of an
artist. Part 2 explores the work of Sun Tzu's The Art of War.
An accessible introduction to the most prevalent cyber threats in
our current climate, this book discusses cyber terrorism, phishing,
and ransomware attacks, and provides advice on how to mitigate such
threats in our personal and professional lives.
A practical guide to enhancing your digital investigations with
cutting-edge memory forensics techniques Key Features Explore
memory forensics, one of the vital branches of digital
investigation Learn the art of user activities reconstruction and
malware detection using volatile memory Get acquainted with a range
of open-source tools and techniques for memory forensics Book
DescriptionMemory Forensics is a powerful analysis technique that
can be used in different areas, from incident response to malware
analysis. With memory forensics, you can not only gain key insights
into the user's context but also look for unique traces of malware,
in some cases, to piece together the puzzle of a sophisticated
targeted attack. Starting with an introduction to memory forensics,
this book will gradually take you through more modern concepts of
hunting and investigating advanced malware using free tools and
memory analysis frameworks. This book takes a practical approach
and uses memory images from real incidents to help you gain a
better understanding of the subject and develop the skills required
to investigate and respond to malware-related incidents and complex
targeted attacks. You'll cover Windows, Linux, and macOS internals
and explore techniques and tools to detect, investigate, and hunt
threats using memory forensics. Equipped with this knowledge,
you'll be able to create and analyze memory dumps on your own,
examine user activity, detect traces of fileless and memory-based
malware, and reconstruct the actions taken by threat actors. By the
end of this book, you'll be well-versed in memory forensics and
have gained hands-on experience of using various tools associated
with it. What you will learn Understand the fundamental concepts of
memory organization Discover how to perform a forensic
investigation of random access memory Create full memory dumps as
well as dumps of individual processes in Windows, Linux, and macOS
Analyze hibernation files, swap files, and crash dumps Apply
various methods to analyze user activities Use multiple approaches
to search for traces of malicious activity Reconstruct threat actor
tactics and techniques using random access memory analysis Who this
book is forThis book is for incident responders, digital forensic
specialists, cybersecurity analysts, system administrators, malware
analysts, students, and curious security professionals new to this
field and interested in learning memory forensics. A basic
understanding of malware and its working is expected. Although not
mandatory, knowledge of operating systems internals will be
helpful. For those new to this field, the book covers all the
necessary concepts.
|
The Touch
(Paperback)
Daniel Keyes
bundle available
|
R285
R233
Discovery Miles 2 330
Save R52 (18%)
|
Ships in 9 - 15 working days
|
|
The ultimate 'what if' novel, from the million-copy-bestselling
author of FLOWERS FOR ALGERNON: 'A masterpiece of poignant
brilliance ... heartbreaking' Guardian Karen and Barney Stark
should never have married. Childless, uncomfortable and
incompatible, their marriage has not been a success, and the lack
of a child only makes the tension between them worse. And living
their lives to the beat of a fertility clock only adds to the
increasingly volatile atmosphere. When an incident at Barney's
workplace causes them both to be unknowingly contaminated with
radioactive dust, they also become pariahs - in their neighbourhood
and with their families. But things are only going to get worse.
Karen discovers she is pregnant and as their closest friends become
frightened enemies, the dream of becoming parents turns into a
nightmare...
|
|