Seller: HPB-Ruby, Dallas, TX, U.S.A.
paperback. Condition: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Seller: Goodbooks Company, Springdale, AR, U.S.A.
Condition: acceptable. This copy may contain significant wear, including bending, heavy writing, tears, and or water damage. This book is a functional copy, not necessarily a beautiful copy. Copy may have loose pages. May not include access codes or CDs. May be an Ex library book with stickers and stamps. Dustjacket may be missing.
Published by Packt Publishing 5/24/2024, 2024
ISBN 10: 1835463266 ISBN 13: 9781835463260
Language: English
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR 0.67. Book.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 42.35
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
US$ 47.50
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 49.33
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 49.32
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 53.63
Convert currencyQuantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New.
Published by Packt Publishing Limited, 2024
ISBN 10: 1835463266 ISBN 13: 9781835463260
Language: English
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing Limited, 2024
ISBN 10: 1835463266 ISBN 13: 9781835463260
Language: English
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 56.81
Convert currencyQuantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by Packt Publishing Limited, 2024
ISBN 10: 1835463266 ISBN 13: 9781835463260
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 54.43
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526.
Seller: Majestic Books, Hounslow, United Kingdom
US$ 75.80
Convert currencyQuantity: 4 available
Add to basketCondition: New. Print on Demand.
Seller: Biblios, Frankfurt am main, HESSE, Germany
US$ 83.83
Convert currencyQuantity: 4 available
Add to basketCondition: New. PRINT ON DEMAND.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 69.18
Convert currencyQuantity: 1 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle endpoint security problems in your organizationApply practical guidance and real-world examples to harden endpoint securityImplement EDR/XDR tools for optimal protection of digital assetsPurchase of the print or Kindle book includes a free PDF Elektronisches BuchBook DescriptionIn this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats. With a focus on endpoint defense, Endpoint Detection and Response Essentials guides you in implementing EDR solutions to stay ahead of attackers and ensure the overall security posture of your IT infrastructure.Starting with an insightful introduction to EDR and its significance in the modern cyber threat landscape, this book offers a quick overview of popular EDR tools followed by their practical implementation. From real-world case studies, best practices, and deployment strategies to maximizing the effectiveness of EDR, including endpoint hardening techniques and advanced DNS visibility methods, this comprehensive resource equips you with the knowledge and hands-on skills to strengthen your organization's defense against cyber attacks. Recognizing the role of the DNS protocol, you'll fortify your organization's endpoint defense proactively.By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization.What you will learnGain insight into current cybersecurity threats targeting endpointsUnderstand why antivirus solutions are no longer sufficient for robust securityExplore popular EDR/XDR tools and their implementationMaster the integration of EDR tools into your security operationsUncover evasion techniques employed by hackers in the EDR/XDR contextGet hands-on experience utilizing DNS logs for endpoint defenseApply effective endpoint hardening techniques within your organizationWho this book is forIf you're an IT professional seeking to safeguard yourself and your company's digital assets, this book is for you. To make the most of its content, a foundational understanding of GNU/Linux, operating systems, networks, and programming concepts is recommended. Additionally, security professionals eager to delve into advanced endpoint defense techniques will find this book invaluable.Table of ContentsIntroduction to Endpoint Security and EDREDR Architecture and Its Key ComponentsEDR Implementation and DeploymentUnlocking Synergy - EDR Use Cases and ChatGPT IntegrationNavigating the Digital Shadows - EDR Hacking TechniquesBest Practices and Recommendations for Endpoint ProtectionLeveraging DNS Logs for Endpoint DefenseThe Road Ahead of Endpoint Security.