Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. For security, network, and systems professionals familiar with security tools and Python.
Cyber Threat Hunting is a practical guide to the subject, that will teach you how to identify attempts to access your systems by spotting the clues your adversaries leave behind. The book lays the path to becoming a successful cyber security threat hunter, guiding you from your very first expedition to hunting in complex cloud-native environments.
Key features include:
Design and implement a cyber threat-hunting framework Think like your adversaries Conduct threat-hunting expeditions Streamline how you work with other cybersecurity teams Structure threat hunting expeditions without losing track of activities and clues Use statistics and machine learning techniques to hunt threats
The organisations that actively seek out security intrusions reduce the time bad actors spend on their sites, increase their cyber resilience, and build strong resistance to sophisticated covert threats. Cyber Threat Hunting gives a reliable and repeatable framework to see and stop attacks.
About the technology
There is no question about whether your security will come under attack. It already is. The real question is whether you will identify and learn from the attacks, when they occur. Cyber threat hunting assumes that a system has been hacked and reveals the signs that have evaded detection tools or been dismissed as unimportant. In the constantly evolving landscape of modern security, threat hunting is a vital practice to avoid complacency and harden your defences against attack.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. For security, network, and systems professionals familiar with security tools and Python.
Cyber Threat Hunting is a practical guide to the subject, that will teach you how to identify attempts to access your systems by spotting the clues your adversaries leave behind. The book lays the path to becoming a successful cyber security threat hunter, guiding you from your very first expedition to hunting in complex cloud-native environments.
Key features include:
Design and implement a cyber threat-hunting framework Think like your adversaries Conduct threat-hunting expeditions Streamline how you work with other cybersecurity teams Structure threat hunting expeditions without losing track of activities and clues Use statistics and machine learning techniques to hunt threats
The organisations that actively seek out security intrusions reduce the time bad actors spend on their sites, increase their cyber resilience, and build strong resistance to sophisticated covert threats. Cyber Threat Hunting gives a reliable and repeatable framework to see and stop attacks.
About the technology
There is no question about whether your security will come under attack. It already is. The real question is whether you will identify and learn from the attacks, when they occur. Cyber threat hunting assumes that a system has been hacked and reveals the signs that have evaded detection tools or been dismissed as unimportant. In the constantly evolving landscape of modern security, threat hunting is a vital practice to avoid complacency and harden your defences against attack.