Investigating the Cyber Breach : the digital forensics guide for the network engineer / Joseph Muniz, Aamir Lakhani.
Contributor(s): Lakhani, Aamir [author.].Publisher: Indianapolis, Indiana : Cisco Press, ©2018Description: xx, 444 pages : illustrations; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781587145025.Subject(s): Information technology -- Security measures | Computer security -- Management | Computer networks -- Security measures | Data protectionGenre/Form: Print books.
|Current location||Call number||Status||Date due||Barcode||Item holds|
|On Shelf||TK5105.59 .M966 2018 (Browse shelf)||Available||AU00000000013283|
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
|TK5105.59.E7323 2017 Threat Level Red : Cybersecurity Research Programs of the U.S. Government.||TK5105.59 .F57 2019 CISO compass : navigating cybersecurity leadership challenges with insights from pioneers /||TK5105.59 .K6787 2017 Cyberspace and cybersecurity /||TK5105.59 .M966 2018 Investigating the Cyber Breach : the digital forensics guide for the network engineer /||TK5105.59 .N3464 2017 New solutions for cybersecurity /||TK5105.59 .R36 2018 Linux® hardening in hostile networks : server security from TLS to TOR /||TK5105.59 .R685 2018 Digital resilience : is your company ready for the next cyber threat? /|
Includes bibliographical references.
Today, cybersecurity professionals recognize that they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they happen. Investigating The Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working networking and security professionals, senior cybersecurity experts Joseph Muñiz and Aamir Lakhani show exactly how to hunt attackers, track their movements within networks, and halt their data exfiltration and thefts of intellectual property. Muñiz and Lakhani show how to use tools ranging from open source software to enterprise solutions: tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike previous digital forensics books focused primarily on collecting evidence for later prosecution, this one focuses on using digital forensics tools to hunt threats, improve threat intelligence, root out dormant malware, and respond quickly and effectively to network compromises happening right now. -- Provided by publisher.
Breach detection is one of the hottest topics in cyber security. As more devices become Internet capable, more systems become targets. This in turn increases the need for digital defenses meaning the intended audience will continue to grow and expand across all business sectors. This book is a guide for various levels of technical competencies. Business minded people and executives would benefit from the incident response and policy content. Network administrators will benefit from the breach detection best practices content. Security experts will benefit from the technical forensics tools and exercises. Unlike the very few books on this topic, this book will be developed as a guide that can be easily applied to any organisation's business practice.