Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques
Key FeaturesSet up an environment to centralize all data in an Elasticsearch, Logst…
If you like book Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools here is the list of books you may also like
Buy this book on AmazonSimilar books (15)
-
Stolen Focus: Why You Can't Pay Attention— and How to Think Deeply Again
Our ability to pay attention is collapsing. From the New York Times bestselling author of Chasing the Scream and Lost Connections comes a groundbreaking examination of why this is happening--and how t…
Buy this book on Amazon -
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Practical Vulnerability Management
Buy this book on Amazon -
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
-
The Art of Living: The Classical Manual on Virtue, Happiness and Effectiveness
Epictetus was born into slavery about 55 C.E. in the eastern outreaches of the Roman Empire. Sold as a child and crippled from the beatings of his master, Epictetus was eventually freed, rising from h…
Buy this book on Amazon -
Meditations
Written in Greek by the only Roman emperor who was also a philosopher, without any intention of publication, the Meditations of Marcus Aurelius offer a remarkable series of challenging spiritual refle…
Buy this book on Amazon -
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Buy this book on Amazon -
Building a Second Brain: A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential
>For the first time in history, we have instantaneous access to the world’s knowledge. There has never been a better time to learn, to contribute, and to improve ourselves. Yet, rather than feeling em…
Buy this book on Amazon -
Letters from a Stoic
HarperCollins is proud to present its incredible range of best-loved, essential classics.
Buy this book on Amazon
No man can live a happy life, or even a supportable life, without the study of wisdom
Lucius Annaeus Seneca (4 … -
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Buy this book on Amazon -
-
Designing Machine Learning Systems: An Iterative Process for Production-Ready Applications
Machine learning systems are both complex and unique. Complex because they consist of many different components and involve many different stakeholders. Unique because they're data dependent, with dat…
Buy this book on Amazon -
The 4-Hour Workweek
What do you do? Tim Ferriss has trouble answering the question. Depending on when you ask this controversial Princeton University guest lecturer, he might answer: "I race motorcycles in Europe." "I sk…
Buy this book on Amazon