Ready to go? Add this product to your cart and select a plan during checkout. Payment plans are offered through our trusted finance partners Klarna, PayTomorrow, Affirm, Afterpay, Apple Pay, and PayPal. No-credit-needed leasing options through Acima may also be available at checkout.
Learn more about financing & leasing here.
This item is eligible for return within 30 days of receipt
To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.
To initiate a return, please visit our Returns Center.
View our full returns policy here.
Format: Paperback
Description
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it. Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements. Read more
Publisher : No Starch Press (October 31, 2023)
Language : English
Paperback : 312 pages
ISBN-10 : 1718503342
ISBN-13 : 42
Item Weight : 1.35 pounds
Dimensions : 7 x 0.72 x 9.25 inches
Best Sellers Rank: #296,668 in Books (See Top 100 in Books) #80 in Computer Viruses #198 in Computer Hacking #239 in Computer Network Security
#80 in Computer Viruses:
#198 in Computer Hacking: