204 81 75MB
English Pages 392
Report DMCA / Copyright
DOWNLOAD MOBI FILE
This book will guide you through the process of setting up a threat hunting environment using Splunk and provide practic
124 76 1MB Read more
Elastic Stack, previously known as the ELK stack, is a log analysis solution that helps users ingest, process, and analy
315 3 30MB Read more
360 24 35MB Read more
Solve SEO problems using data science. This hands-on book is packed with Python code and data science techniques to help
198 89 39MB Read more
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System. While
359 46 6MB Read more
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning
358 56 75MB Read more
117 70 30MB Read more
163 17 2MB Read more
397 115 24MB Read more
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Ke
317 33 14MB Read more