Cyber Security Incident Response Books For Beginners and Advanced Computer Forensics realm

What is Incident Response?

Topics Discussed show

1. Intelligence-Driven Incident Response: Outwitting the Adversary

“Predictive pre-defense” and “prompt and accurate incident response” should be the two key drivers which makes Intelligence-Driven Incident Response: Outwitting the Adversary one of the most useful books for realizing Intelligence-driven incident response.

The books throws light intelligence as the main vector in the IR operational function narrative  

If you are an incident responder, security analyst, or just interested in threat intelligence, this book is for you. The authors give detailed examples of the techniques used to gather intelligence, and how they can be used to better respond to threats. The book is illustrated with real-world examples that will help the reader learn the concepts presented.

Author:

Scott J. Roberts and Rebekah Brown

Latest Edition:

January 2017

Publisher

2. The Practice of Network Security Monitoring

This big-steps book is full of technical information about network monitoring/investigation/analysis of logs, inspecting network packets and how to bind incident response around it.

It is full of explanations of how NSA has a soft spot for metadata.

This book is intelligence-driven incident response, which is a very interesting and promising approach to network security. 

The book may be most useful if you plan to use the recommended tools to monitor your network.

Author: Richard Bejtlich

Latest Edition

Publisher

3. Reversing: The Secrets of Reverse Engineering

The Secrets of Reverse Engineering is a good introduction to reverse engineering, especially in Microsoft Windows environments. 

The book explains some useful tips on:

  • x86 assembly code, 
  • Packers,
  • anti-debugging techniques etc.

It also delves into some often overlooked areas of reversing like how to enhance your analysis by reading intermediate objects that are left behind during compilation.

Author: Eldad Eilam

Latest Edition

Publisher

4. The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence

A solid, comprehensive guide without the fluff, this book is a great resource for anyone wanting to learn about cyber threat intelligence. 

It’s not overly technical and a “must read” for CISOs, security managers, and IT security practitioners etc.

Product details

  • ASIN ‏ : ‎ B07L7ZH119
  • Publisher ‏ : ‎
  • Language ‏ : ‎ English

Author: Eldad Eilam

Author: Recorded Future

Latest Edition: April 2005

Publisher: CyberEdge Group

5. The Cyber Intelligence Handbook: An Authoritative Guide for the C-Suite, IT Staff, and Intelligence Team

This book is an incredible resource for anyone looking to get started with Cyber Threat Intelligence and how it stops malicious cyber-threat actors targeting networks and data.

A cyber intelligence guide, this book provides common sense practices for establishing and growing a Cyber Threat Intelligence process unit. 

The author covers the critical components of establishing an intelligence program and how to make it more proactive and responsive to emerging threats. Cyber Threat Intelligence is a rapidly growing field and this book provides a comprehensive guide to getting started and staying ahead of the curve for the C-Suite, IT Staff, and Intelligence Team

Author: David M. Cooney Jr.

Latest Edition

Publisher: Independently Published

6. Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Want to be part of OSINT ‘game’ to understand the best of would-be detectives? 

The book is on the best resources on Open Source Intelligence Techniques. Apt for OSINT beginners and experienced workers to gather digital information, there are dedicated chapters and sections for:

  • specialized websites
  • APIs 
  • and software solutions.

Author: Michael Bazzell

Latest Edition: July 2019

Publisher

7. Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter

Author: Don Murdoch

Latest Edition

Publisher

8. Security Operations Center – SIEM Use Cases and Cyber Threat Intelligence

Author: Arun E Thomas

Latest Edition

Publisher

9. The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Author: Richard Bejtlich

Latest Edition

Publisher

10. Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Author: David R. Miller, Shon Harris, Allen Harper, Stephen VanDyke, and Chris Blask

Latest Edition

Publisher

11. Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

Author: Jeff Bollinger, Brandon Enright, and Matthew Valites

Latest Edition

Publisher

12: Principles of Information Security

Author: Michael E. Whitman and Herbert J. Mattord

Latest Edition

Publisher

13. Elementary Information Security

Author: Richard E. Smith

Latest Edition

Publisher

14. Fundamentals of Information Systems Security

Author: David Kim and Michael G. Solomon

Latest Edition

Publisher

15. Foundations of Information Security: A Straightforward Introduction

Author: Jason Andress

Latest Edition

Publisher

16. Information Security: Principles and Practice

Author: Mark Stamp

Latest Edition

Publisher

17. Practical Malware Analysis

Author: Michael Sikorski

Latest Edition

Publisher

18. Incident Response & Computer Forensics

Author: Matthew Pepe, Jason T. Luttgens and Kevin Mandia

Latest Edition

Publisher

19. Silent on the Wire

Author: Michal Zalewski

Latest Edition

Publisher

20. Information Security Policies, Procedures, and Standards

Author: Douglas J. Landoll

Latest Edition

Publisher

21. The Hacker Playbook 3: Practical Guide To Penetration Testing

Author: Peter Kim

Latest Edition

Publisher

22. Intelligence-Driven Incident Response

Author: Scott J. Roberts and Rebekah Brown

Latest Edition

Publisher

23. The Art of War for Security Managers

Author: Scott A. Watson

Latest Edition

Publisher

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top