Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 253
- Management 250
- Application software 237
- History 236
- Engineering & Applied Sciences 180
- Computer networks 151
- Data processing 140
- Computer Science 124
- Cloud computing 120
- Design 115
- Security measures 114
- Computer programs 107
- Computer programming 105
- Python (Computer program language) 104
- Leadership 103
- Artificial intelligence 98
- Microsoft .NET Framework 94
- Computer software 90
- Machine learning 88
- Database management 87
- Examinations 87
- Information technology 84
- Web sites 84
- Web site development 83
- Programming 82
- Computer security 79
- Software engineering 79
- Big data 77
- Philosophy 73
- Social aspects 71
-
5241
-
5242
-
5243
-
5244Publicado 2011Libro
-
5245
-
5246
-
5247Publicado 2019Libro electrónico
-
5248Publicado 2008Libro electrónico
-
5249Publicado 2022Tabla de Contenidos: “…Further reading -- Chapter 15: Ransomware Investigations -- Ransomware initial access and execution -- Initial access -- Execution -- Discovering credential access and theft -- ProcDump -- Mimikatz -- Investigating post-exploitation frameworks -- Command and Control -- Security Onion -- RITA -- Arkime -- Investigating lateral movement techniques -- Summary -- Questions -- Further reading -- Part 5: Threat Intelligence and Hunting -- Chapter 16: Malware Analysis for Incident Response -- Malware analysis overview -- Malware classification -- Setting up a malware sandbox -- Local sandbox -- Cloud sandbox -- Static analysis -- Static properties analysis -- Dynamic analysis -- Process Explorer -- Process Spawn Control -- Automated analysis -- ClamAV -- YARA -- YarGen -- Summary -- Questions -- Further reading -- Chapter 17: Leveraging Threat Intelligence -- Threat intelligence overview -- Threat intelligence types -- The Pyramid of Pain -- The threat intelligence methodology -- Sourcing threat intelligence -- Internally developed sources -- Commercial sourcing -- Open source intelligence -- The MITRE ATT& -- CK framework -- Working with IOCs and IOAs -- Threat intelligence and incident response -- Autopsy -- Maltego -- YARA and Loki -- Summary -- Questions -- Further reading -- Chapter 18: Threat Hunting -- Threat hunting overview -- Threat hunt cycle -- Threat hunt reporting -- Threat hunting maturity model -- Crafting a hypothesis -- MITRE ATT& -- CK -- Planning a hunt -- Digital forensic techniques for threat hunting -- EDR for threat hunting -- Summary -- Questions -- Further reading -- Appendix -- Assessments -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
5250Publicado 2009Libro electrónico
-
5251Publicado 2023Libro electrónico
-
5252Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of System Design -- Chapter 1: Basics of System Design -- What is system design? …”
Libro electrónico -
5253
-
5254
-
5255
-
5256
-
5257
-
5258
-
5259Libro electrónico
-
5260por Elverdinghe, Emmanuel van
Publicado 2022Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universitat Ramon Llull, Red de Bibliotecas de la Archidiócesis de Granada, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro