_version_ |
1811129284061822976
|
author |
Yahia, Mostafa
|
author_facet |
Yahia, Mostafa
|
author_sort |
Yahia, Mostafa
|
collection |
OCEAN
|
first_indexed |
2024-09-23T23:45:31Z
|
format |
|
id |
KOHA-OAI-TEST:612062
|
institution |
Universiti Teknologi Malaysia - OCEAN
|
last_indexed |
2024-09-23T23:45:31Z
|
publishDate |
2023
|
publisher |
De Gruyter
|
record_format |
dspace
|
spelling |
KOHA-OAI-TEST:6120622024-09-01T07:30:32ZEffective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Yahia, Mostafa De Gruyter2023URN:ISBN:9781837638758
|
spellingShingle |
Yahia, Mostafa
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title_full |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title_fullStr |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title_full_unstemmed |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title_short |
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
|
title_sort |
effective threat investigation for soc analysts the ultimate guide to examining various threats and attacker techniques using security logs
|
work_keys_str_mv |
AT yahiamostafa effectivethreatinvestigationforsocanalyststheultimateguidetoexaminingvariousthreatsandattackertechniquesusingsecuritylogs
|