The book discusses the practical aspects of incident response in information security and the analysis of cyber threats. It thoroughly presents the theory of threat research, outlines the foundations of analytical activities for information security specialists, and describes incident response...
protocols based on analytical data (Intelligence-Driven Incident Response, IDIR). The F3EAD model—Find, Fix, Finish, Exploit, Analyze, and Disseminate—is clearly illustrated with practical examples. Attention is given to strategic analytical activities and building an effective team of analysts.
The book discusses the practical aspects of incident response in information security and the analysis of cyber threats. It thoroughly presents the theory of threat research, outlines the foundations of analytical activities for information security specialists, and describes incident response protocols based on analytical data (Intelligence-Driven Incident Response, IDIR). The F3EAD model—Find, Fix, Finish, Exploit, Analyze, and Disseminate—is clearly illustrated with practical examples. Attention is given to strategic analytical activities and building an effective team of analysts.
Be the first to know about our current discounts, offers and new products!
Check icon
You have added to your basket
Check icon
You have added to favourites
Sold out
The item is currently out of stock.
In stock
Available in warehouse. You will receive the exact delivery date from the operator after the order confirmation.
To order
The product is delivered directly from the publisher. The order processing time is up to 14 days, you will receive the exact delivery date from the operator after the order confirmation.
No circulation
Unfortunately, the print run of the book has ended, it is currently unavailable for order.