Crafting the Infosec Playbook (2015)
Chapter 1. Incident Response Fundamentals
Chapter 2. What Are You Trying to Protect?
Chapter 3. What Are the Threats?
Chapter 4. A Data-Centric Approach to Security Monitoring
Chapter 8. Queries and Reports
Chapter 10.I’ve Got Incidents Now! How Do I Respond?
Chapter 11.How to Stay Relevant