Muutke küpsiste eelistusi

Blue Team Handbook: SOC, SIEM, and Threat Hunting: Practical Techniques for Security Operations and Threat Hunting Teams [Pehme köide]

  • Formaat: Paperback / softback, 270 pages, kõrgus x laius: 232x178 mm
  • Ilmumisaeg: 30-Apr-2026
  • Kirjastus: O'Reilly Media
  • ISBN-13: 9798341662292
Teised raamatud teemal:
  • Pehme köide
  • Hind: 63,36 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 74,54 €
  • Säästad 15%
  • See raamat ei ole veel ilmunud. Raamatu kohalejõudmiseks kulub orienteeruvalt 3-4 nädalat peale raamatu väljaandmist.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 270 pages, kõrgus x laius: 232x178 mm
  • Ilmumisaeg: 30-Apr-2026
  • Kirjastus: O'Reilly Media
  • ISBN-13: 9798341662292
Teised raamatud teemal:

As cyberthreats become more sophisticated and alert volumes rise, security teams need more than just tools—they need strategy, structure, and field-tested guidance. Following the success of the original print edition, this updated digital edition of Blue Team Handbook: SOC, SIEM, and Threat Hunting is still the essential resource for building, optimizing, and managing modern detection engineering practices and security operations centers.

This practical guide distills over 20 years of frontline cybersecurity experience into an actionable playbook for analysts, SOC managers, architects, detection engineers, and threat hunters. Author Don Murdoch delivers expert insights designed to help teams improve quickly. Whether you're refining your current operations or launching a SOC from scratch, this book empowers you with proven, real-world techniques to defend against today's most persistent threats.

  • Build and organize SOC teams for maximum operational impact
  • Understand how to launch and execute a comprehensive telemetry, audit data, and SIEM deployment strategy
  • Create effective SOC use cases, including risk-based alerting
  • Develop and apply meaningful metrics to evaluate SOC effectiveness, analyst performance, and SIEM utility
  • Identify advanced threats using real-world threat hunting techniques