free counter statistics

Blue Team Field Manual (BTFM) (RTFM)



Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

Blue Team Field Manual

ISBN 10 : 154101636X
ISBN 13 : 9781541016361

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Prote..


Rtfm

ISBN 10 : 1494295504
ISBN 13 : 9781494295509

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to s..


Blue Team Handbook

ISBN 10 : 1500734756
ISBN 13 : 9781500734756

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The B..


Defensive Security Handbook

ISBN 10 : 9781491960356
ISBN 13 : 1491960353

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information ..


Red Team

ISBN 10 : 9780465073955
ISBN 13 : 0465073956

An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries..


The Hacker Playbook 2

ISBN 10 : 1512214566
ISBN 13 : 9781512214567

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker P..


Penetration Testing

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..