Practical threat intelligence and data-driven thread hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source tools / Valentina Costa-Gazcon
Material type:
- 9781838556372
- TK 5105.875.I57 .G39 2021

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC TK 5105.875.I57 .G39 2021 (Browse shelf(Opens below)) | c.1 | Available | NULIB000019387 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
No cover image available |
![]() |
![]() |
No cover image available | No cover image available | No cover image available | ||
GC TK 5105.59 .S54 2014 c.2 Anti-hacker tool kit / | GC TK 5105.59 .W45 2005 Principles of information security / | GC TK 5105.59 .W45 2014 Management of information security / | GC TK 5105.875.I57 .G39 2021 Practical threat intelligence and data-driven thread hunting : a hands-on guide to threat hunting with the ATT&CK framework and open source tools / | GC TK 5105.888 .J66 2022 UX/UI Design 2022 : a comprehensive UI & UX guide to master web design and mobile app sketches for beginners and pros / | GC TK 7885.4 .B47 2023 Computers made easy : from dummy to geek / | GC TK 7887.6 .D38 1995 Analog-to-digital conversion : a practical approach / |
Includes index.
What is Cyber Threat Intelligence? -- What is Threat Hunting? -- Where Does the Data Come From? -- Mapping the Adversary -- Working with Data -- Emulating the Adversary -- Creating a Research Environment -- How to Query the Data -- Hunting for the Adversary -- Importance of Documenting and Automating the Process -- Assessing Data Quality -- Understanding the Output -- Defining Good Metrics to Track Success -- Engaging the Response Team and Communicating the Result to Executives.
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
There are no comments on this title.