Description: Crafting an Information Security Playbook by Jeff Bollinger, Brandon Enright, Matthew Valites Estimated delivery 4-14 business days Format Paperback Condition Brand New Description Written by members of Ciscos Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Publisher Description Any good attacker will tell you that expensive security monitoring and prevention tools arenundefinedt enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. Youundefinedll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.Written by members of Ciscoundefineds Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Book features : Learn incident response fundamentalsundefinedand the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase About the Authors With over ten years of information security experience, Jeff Bollinger has worked as a security architect and incident responder for both academic and corporate networks. Specializing in investigations, network security monitoring, and intrusion detection, Jeff Bollinger currently works as an information security investigator, and has built and operated one of the worlds largest corporate security monitoring infrastructures. Jeff regularly speaks at international FIRST conferences, and writes for the Cisco Security Blog. His recent work includes log mining, search optimization, threat research, and security investigations. Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelors degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates. Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games. Matthew Valites is a senior investigator and site lead on Ciscos Computer Security Incident Response Team (CSIRT). He provides expertise building an Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRTs detection logic, and mobile device hacking. Matt enjoys speaking at international conferences, and is keen to share CSIRTs knowledge, best practices, and lessons-learned." Author Biography With over ten years of information security experience, Jeff Bollinger has worked as security architect and incident responder for both academic and corporate networks. Specializing in investigations, network security monitoring, and intrusion detection, Jeff Bollinger currently works as an information security investigator, and has built and operated one of the worlds largest corporate security monitoring infrastructures. Jeff regularly speaks at international FIRST conferences, and writes for the Cisco Security Blog. His recent work includes log mining, search optimization, threat research, and security investigations. Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelors degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates. Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games. Matthew Valites is a senior investigator and site lead on Ciscos Computer Security Incident Response Team (CSIRT). He provides expertise building an Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRTs detection logic, and mobile device hacking. Matt enjoys speaking at international conferences, and is keen to share CSIRTs knowledge, best practices, and lessons-learned. Details ISBN 1491949406 ISBN-13 9781491949405 Title Crafting an Information Security Playbook Author Jeff Bollinger, Brandon Enright, Matthew Valites Format Paperback Year 2015 Pages 276 Publisher OReilly Media GE_Item_ID:94030839; About Us Grand Eagle Retail is the ideal place for all your shopping needs! With fast shipping, low prices, friendly service and over 1,000,000 in stock items - you're bound to find what you want, at a price you'll love! Shipping & Delivery Times Shipping is FREE to any address in USA. Please view eBay estimated delivery times at the top of the listing. Deliveries are made by either USPS or Courier. We are unable to deliver faster than stated. International deliveries will take 1-6 weeks. NOTE: We are unable to offer combined shipping for multiple items purchased. This is because our items are shipped from different locations. Returns If you wish to return an item, please consult our Returns Policy as below: Please contact Customer Services and request "Return Authorisation" before you send your item back to us. Unauthorised returns will not be accepted. Returns must be postmarked within 4 business days of authorisation and must be in resellable condition. Returns are shipped at the customer's risk. We cannot take responsibility for items which are lost or damaged in transit. For purchases where a shipping charge was paid, there will be no refund of the original shipping charge. Additional Questions If you have any questions please feel free to Contact Us. Categories Baby Books Electronics Fashion Games Health & Beauty Home, Garden & Pets Movies Music Sports & Outdoors Toys
Price: 44.05 USD
Location: Calgary, Alberta
End Time: 2024-11-29T03:41:47.000Z
Shipping Cost: 0 USD
Product Images
Item Specifics
Restocking Fee: No
Return shipping will be paid by: Buyer
All returns accepted: Returns Accepted
Item must be returned within: 30 Days
Refund will be given as: Money Back
ISBN-13: 9781491949405
Book Title: Crafting an Information Security Playbook
Number of Pages: 273 Pages
Publication Name: Crafting the Infosec PlayBook : Security Monitoring and Incident Response Master Plan
Language: English
Publisher: O'reilly Media, Incorporated
Item Height: 0.6 in
Subject: Security / General, Security / Viruses & Malware, Security / Networking, System Administration / Storage & Retrieval, Criminology
Publication Year: 2015
Type: Textbook
Item Weight: 17.1 Oz
Subject Area: Computers, Social Science
Author: Brandon Enright, Jeff Bollinger, Matthew Valites
Item Length: 9.2 in
Item Width: 7 in
Format: Trade Paperback