Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs

Bibliographic Details
Main Author: Yahia, Mostafa
Format:
Published: De Gruyter 2023
_version_ 1811129284061822976
author Yahia, Mostafa
author_facet Yahia, Mostafa
author_sort Yahia, Mostafa
collection OCEAN
first_indexed 2024-09-23T23:45:31Z
format
id KOHA-OAI-TEST:612062
institution Universiti Teknologi Malaysia - OCEAN
last_indexed 2024-09-23T23:45:31Z
publishDate 2023
publisher De Gruyter
record_format dspace
spelling KOHA-OAI-TEST:6120622024-09-01T07:30:32ZEffective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Yahia, Mostafa De Gruyter2023URN:ISBN:9781837638758
spellingShingle Yahia, Mostafa
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title_full Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title_fullStr Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title_full_unstemmed Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title_short Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
title_sort effective threat investigation for soc analysts the ultimate guide to examining various threats and attacker techniques using security logs
work_keys_str_mv AT yahiamostafa effectivethreatinvestigationforsocanalyststheultimateguidetoexaminingvariousthreatsandattackertechniquesusingsecuritylogs