Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
62 Security De-engineering
investigation. ere is a snag though—because security teams do not
have an abundance of IT skills, they will not have been granted access
to IT resources such as computers and routers, so how can they do the
investigation themselves [and although some rms have deployed a log
correlation solution from the security information event management
(SIEM) product family, it is usually the IT or network operations
sta who have responsibility for the management and monitoring of
SIEM]?
To be fair, there are some security pros who do know something
about security incident management and investigation, and in rms
who are lucky enough to have such people on their books, you will
quite often see initial attempts by security ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355