Books & Videos

Table of Contents

  1. Chapter 1 Vantage, Domain, Action

  2. Chapter 2 The Network Domain

  3. Chapter 3 Network Sensors

  4. Chapter 4 The Service Domain

  5. Chapter 5 Service Sensors

  6. Chapter 6 The Host domain

  7. Chapter 7 Host Sensors

  8. Chapter 8 The active Domain

  9. Chapter 9 Security Analysis Environments

  10. Chapter 10 PANDAS for Security Analysis

  11. Chapter 11 An introduction to the Silk Suite

  12. Chapter 12 SiLK Cookbook

  13. Chapter 13 Reference and Lookup

  14. Chapter 14 EDA and Visualization

  15. Chapter 15 EDA 2: Regression

  16. Chapter 16 Text Processing

  17. Chapter 17 Fumbling

  18. Chapter 18 Exhaustion

  19. Chapter 19 Inconsistency

  20. Chapter 20 Insider Threat

  21. Chapter 21 Graphs

  22. Chapter 22 Threat Intelligence

  23. Chapter 23 Mapping and App ID

  24. Chapter 24 Supporting Ops Workflow