- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 70字
- 2021-06-30 19:15:48
Incident response process
There are many industry standards, recommendations, and best practices that can help you to create your own incident response. You can still use those as a reference to make sure you cover all the relevant phases for your type of business. The one that we are going to use as a reference in this book is the Computer Security Incident Response (CSIR)—publication 800-61R2 from NIST(1).
推薦閱讀
- Linux實(shí)戰(zhàn)
- 巧學(xué)活用Windows 7
- Linux內(nèi)核觀測技術(shù)BPF
- Linux服務(wù)器配置與管理
- RHCSARHCE 紅帽Linux認(rèn)證學(xué)習(xí)指南(第7版)EX200 & EX300
- 嵌入式微系統(tǒng)
- 大學(xué)計(jì)算機(jī)應(yīng)用基礎(chǔ)實(shí)踐教程(Windows 7+MS Office 2010)
- 每天5分鐘玩轉(zhuǎn)Docker容器技術(shù)
- BuddyPress Theme Development
- 15分鐘!畫出我的漫畫角色:賣萌篇
- 再也不踩坑的kubernetes實(shí)戰(zhàn)指南
- openEuler操作系統(tǒng)核心技術(shù)與行業(yè)應(yīng)用實(shí)踐
- Gradle Effective Implementations Guide(Second Edition)
- 樹莓派+傳感器:創(chuàng)建智能交互項(xiàng)目的實(shí)用方法、工具及最佳實(shí)踐
- 數(shù)字系統(tǒng)設(shè)計(jì)與VHDL