Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 2nd edition. 156 pages. 9.00x6.00x0.36 inches. In Stock.
Published by Freedom Forum Media Studies Center
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
£ 13.62
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.4.
Seller: medimops, Berlin, Germany
£ 29.95
Convert currencyQuantity: 1 available
Add to basketCondition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 45.13
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 2021-07, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 45.62
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 49.64
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: California Books, Miami, FL, U.S.A.
£ 46.34
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Packt Publishing 7/23/2021, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
£ 45.27
Convert currencyQuantity: 5 available
Add to basketPaperback or Softback. Condition: New. Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response 1.48. Book.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Rarewaves.com UK, London, United Kingdom
£ 55.35
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you've mastered the basics, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What you will learnExplore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is forSecurity analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 41.80
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Best Price, Torrance, CA, U.S.A.
£ 37.18
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Rarewaves USA United, OSWEGO, IL, U.S.A.
£ 58.30
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you've mastered the basics, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What you will learnExplore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is forSecurity analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
£ 46.68
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
£ 54.20
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security mon.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
£ 61.63
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you've mastered the basics, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What you will learnExplore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is forSecurity analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.
Seller: Goodbookscafe, Macon, GA, U.S.A.
£ 33.40
Convert currencyQuantity: 1 available
Add to basketCondition: very_good. Used with minimal wear, no writing or markings, corners maybe bent, few crease lines.
Published by Freedom Forum Media Studies Center, 1994
Seller: Sperry Books, Rollinsford, NH, U.S.A.
£ 13.62
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Very Good. Columbia University/ Freedom Forum Media Studies Center 1994 paperback, faint corner crease on fine wrapper, smooth spine, tight binding, clean text Prompt, reliable service, shipped next business day. Int'l mailed via first class or priority.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
£ 40.78
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Commonwealth Secretarial, 2012
ISBN 10: 1849290695 ISBN 13: 9781849290692
Language: English
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 170 pages. 9.00x6.25x0.50 inches. In Stock.
Published by Packt Publishing Limited, GB, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
£ 58.41
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New. Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you've mastered the basics, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What you will learnExplore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is forSecurity analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.
Published by Packt Publishing Limited, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
£ 46.23
Convert currencyQuantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing Limited, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
£ 51.54
Convert currencyQuantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing Limited, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 51.11
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 100.
Published by Packt Publishing, Limited, 2021
ISBN 10: 1801073783 ISBN 13: 9781801073783
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 392.
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 67.67
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examples Key Features:Get started with Elastic Security configuration and features Understand how to use Elastic Stack features to provide optimal protection against threats Discover tips, tricks, and best practices to enhance the security of your environment Book Description: Elastic Security is an open solution that equips professionals with the tools to prevent, detect, and respond to threats. Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network. You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations. You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. Further, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities. By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network. What You Will Learn:Explore cyber threat intelligence analytical models and hunting methodologies Build and configure Elastic Stack for cyber threat hunting Leverage the Elastic endpoint and Beats for data collection Perform security data analysis using the Kibana Discover, Visualize, and Dashboard apps Execute hunting and response operations using the Kibana Security app Use Elastic Common Schema to ensure data uniformity across organizations Who this book is for: Security analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.