Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
ISBN: 978-1-83763-478-1
- Get familiarized with and investigate various threat types and attacker techniques
- Analyze email security solution logs and understand email flow and headers
- Practically investigate various Windows threats and attacks
- Analyze web proxy logs to investigate C&C communication attributes
- Leverage WAF and FW logs and CTI to investigate various cyber attacks
Cloud Auditing Best Practices
Shinesa Cambric and Michael Ratemo
ISBN: 978-1-80324-377-1
- Understand the cloud shared responsibility and role of an IT auditor
- Explore change management and integrate it with DevSecOps processes
- Understand the value of performing cloud control assessments
- Learn tips and tricks...