- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 70字
- 2021-06-30 19:15:48
Incident response process
There are many industry standards, recommendations, and best practices that can help you to create your own incident response. You can still use those as a reference to make sure you cover all the relevant phases for your type of business. The one that we are going to use as a reference in this book is the Computer Security Incident Response (CSIR)—publication 800-61R2 from NIST(1).
推薦閱讀
- WordPress Mobile Web Development:Beginner's Guide
- 深入Linux內核架構與底層原理(第2版)
- 細說Linux基礎知識
- 無蘋果不生活 The New iPad隨身寶典
- 突破平面3ds Max動畫設計與制作
- Kali Linux 2018:Windows Penetration Testing
- Windows 8實戰從入門到精通(超值版)
- Python UNIX和Linux系統管理指南
- Distributed Computing with Go
- Linux內核API完全參考手冊(第2版)
- Linux系統安全:縱深防御、安全掃描與入侵檢測
- 鴻蒙HarmonyOS應用開發從入門到精通
- Windows 8玩全不求人
- Apache ShardingSphere權威指南
- Administering ArcGIS for Server