- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 70字
- 2021-06-30 19:15:48
Incident response process
There are many industry standards, recommendations, and best practices that can help you to create your own incident response. You can still use those as a reference to make sure you cover all the relevant phases for your type of business. The one that we are going to use as a reference in this book is the Computer Security Incident Response (CSIR)—publication 800-61R2 from NIST(1).
推薦閱讀
- Linux設備驅動開發詳解:基于最新的Linux4.0內核
- 嵌入式Linux開發技術
- Mastering Distributed Tracing
- Windows Phone 7.5 Data Cookbook
- Mastering KVM Virtualization
- Linux Shell編程從入門到精通(第2版)
- 混沌工程實戰:手把手教你實現系統穩定性
- Delphi Programming Projects
- 計算機系統的自主設計
- INSTANT Galleria Howto
- Red Hat Enterprise Linux 6.4網絡操作系統詳解
- Introduction to R for Quantitative Finance
- 從實踐中學習Windows滲透測試
- μC/OS-III內核實現與應用開發實戰指南:基于STM32
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)