000 01522nam a2200229Ia 4500
003 NULRC
005 20250520103025.0
008 250520s9999 xx 000 0 und d
020 _a9781838556372
040 _cNULRC
050 _aTK 5105.875.I57 .G39 2021
100 _aGazcon, Valentina Costa-
_eauthor
245 0 _aPractical threat intelligence and data-driven thread hunting :
_ba hands-on guide to threat hunting with the ATT&CK framework and open source tools /
_cValentina Costa-Gazcon
260 _aBirmingham, UK :
_bPackt Publishing, Limited,
_cc2021
300 _a398 pages :
_billustrations ;
_c24 cm.
365 _bUSD42
504 _aIncludes index.
505 _aWhat is Cyber Threat Intelligence? -- What is Threat Hunting? -- Where Does the Data Come From? -- Mapping the Adversary -- Working with Data -- Emulating the Adversary -- Creating a Research Environment -- How to Query the Data -- Hunting for the Adversary -- Importance of Documenting and Automating the Process -- Assessing Data Quality -- Understanding the Output -- Defining Good Metrics to Track Success -- Engaging the Response Team and Communicating the Result to Executives.
520 _aThreat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
650 _aCOMPUTER SECURITY
942 _2lcc
_cBK
999 _c21628
_d21628