Practical threat intelligence and data-driven threat hunting : (Record no. 399)

MARC details
000 -LEADER
fixed length control field 01913nam a22002537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field MYCC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250212112342.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250212b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781838556372
040 ## - CATALOGING SOURCE
Original cataloging agency MYCC
Language of cataloging eng
Modifying agency MYCC
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) 005.8
Item number GAZ 2021
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Costa-Gazcón, Valentina,
Relator term author.
245 10 - TITLE STATEMENT
Title Practical threat intelligence and data-driven threat hunting :
Remainder of title a hands-on guide to threat hunting with the ATT&CK framework and open source tools
Statement of responsibility, etc. / Valentina Costa-Gazcón.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, England :
Name of producer, publisher, distributor, manufacturer Packt Publishing, Limited,
Date of production, publication, distribution, manufacture, or copyright notice [2021]
300 ## - PHYSICAL DESCRIPTION
Extent xii, 379 pages:
Other physical details illustrations;
Dimensions 24cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc. "Threat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.This book is not only an introduction for those who don't know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you'll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework.By the end of this book, you'll have the skills you need to be able to carry out effective hunts in your own environment." -- Publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification     MYCC Library MYCC Library General stacks 12/02/2025   005.8 PAL 2021 12/02/2025 12/02/2025 Books
    Dewey Decimal Classification     MYCC Library MYCC Library Reference 12/02/2025   005.8 PAL 2021 REF 12/02/2025 12/02/2025 Reference

© 2024 Malaysia Competition Commission (MyCC) All Rights Reserved.

FOLLOW US ON