000 | 01717nam a2200337 i 4500 | ||
---|---|---|---|
001 | C00087419c | ||
005 | 20230317144908.0 | ||
008 | 200217s20172017ca d fr 001 0 eng d | ||
020 | _a9781491934944 | ||
040 |
_aDO-SdBDB _bspa _cDO-SdBDB |
||
041 | _aeng | ||
043 | _an-us-ca | ||
050 | 4 |
_aHV 6773 _b.R63 2017 |
|
100 | 1 | _aRoberts, Scott J. | |
245 | 0 | 0 |
_aIntelligence-driven incident response : _boutwitting the adversary / _cScott J. Roberts and Rebekah Brfown ; interior designer David Futato ; cover designer Karen Montgomery ; illustrator Rebecca Demarest. |
250 | _aFirst edition. | ||
260 |
_aSebastopol, CA : _bO'Reilly, _c2017. |
||
300 |
_axvii, 260 páginas : _bgráficas a blanco y negro ; _c23 cm. |
||
500 | _aMaterial de apoyo Departamento Seguridad Cibernética y de la Información. | ||
505 | 1 |
_aForeword, ix -- _tPreface, xiii -- _tPart 1. The fundamentals -- _t1. Introduction, 1 -- _t2. Basics of intelligence, 9 -- _t3. Basics of incident response, 27 -- _tPart II. Practical applications -- _t4. Find, 61 -- _t5. fix, 79 -- _t6. Finish, 105 -- _t7. Exploit, 123 -- _t8. Analyze, 137 -- _t9. Disseminate, 163 -- _tPart III. The way forward -- _t10. Strategic intelligence, 207 -- _t11. Building and intelligence program, 223 -- _tA. Intelligence products, 241 -- _tIndex, 251. |
|
650 | _aDelito informático. | ||
650 | _aSeguridad en computadores. | ||
650 | _aRedes informáticas. | ||
650 | _aInvestigación. | ||
650 | _aAnálisis de datos. | ||
700 | 1 | _aBrown, Rebekah. | |
700 | 1 |
_aFutato, David., _einterior designer. |
|
700 | 1 |
_aMontgomery, Karen., _ecover designer. |
|
700 | 1 |
_aDemarest, Rebecca., _eillustrator. |
|
942 | _cCG | ||
999 |
_c126432 _d126432 |