

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to Grenada.
*** NOTICE *** Version 3.0 is now SCHEDULED to release Dec 15, 2025. Version 3 has 164 new pages of material to guide you on your cyber incident response journey, 180% larger t han the 2016 publication. ** *** YOU A RE LOOKNG AT V.2.2, WHICH WAS PRICED AT 99.00 TO DISCOURAGE ITS PURCHASE!!! *** BTHb:INRE - Version 2.2 now available.Voted #3 of the 100 Best Cyber Security Books of All Time by Vinod Khosla, Tim O'Reilly andMarcus Spoons Stevens on BookAuthority.com as of 06/09/2018!The Blue Team Handbook is a "zero fluff" reference guide for cyber security incident responders, security engineers, and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience", so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server – this book should help you handle the case and teach you some new techniques along the way. Version 2.2 updates: - *** A new chapter on Indicators of Compromise added. - Table format slightly revised throughout book to improve readability. - Dozens of paragraphs updated and expanded for readability and completeness. - 15 pages of new content since version 2.0. Review: Great Read, and Awesome Resource. - Great Book to give insight to the blue team side. It has some of that simple common sense stuff. But it takes that and puts it into a plan! Very deep insight into the importance of being prepared and explaining why. Also has some cool more advance advice to read up on. Gives command line examples of different parameters to use and shows the result you will get. Review: Original review was 4 stars... - Simply because I didnt know what I was doing. This manual will grow with you. I have added and taken away some tips and tripsnof my own. Awesome read!
| Best Sellers Rank | #367,934 in Books ( See Top 100 in Books ) #11 in Computer Networking (Books) #55 in Computer Network Security |
| Customer Reviews | 4.7 out of 5 stars 465 Reviews |
M**D
Great Read, and Awesome Resource.
Great Book to give insight to the blue team side. It has some of that simple common sense stuff. But it takes that and puts it into a plan! Very deep insight into the importance of being prepared and explaining why. Also has some cool more advance advice to read up on. Gives command line examples of different parameters to use and shows the result you will get.
J**S
Original review was 4 stars...
Simply because I didnt know what I was doing. This manual will grow with you. I have added and taken away some tips and tripsnof my own. Awesome read!
P**O
Great Resource to Have on hands for Security Analysts
Great Resource to Have on hands for Security Analysts. I have been using many of the techniques described in this book over the past few years but this book expanded on that knowledge a bit more than I was used to. It's great because it has all of the most common things one would typically run into on their day-to-day job as a security analyst. Not completely comprehensive but that's not the purpose of this book.
M**T
Great book
Nice companion to the RTFM. I have been in INFOSEC for a while and I found most of the book to be somewhat generic. My feelings may not apply to everyone else though. There seems to be an idea out there that everyone in INFOSEC sits around grepping Snort logs and/or TCP dumps; this simply is not the case. As an incident first responder the job is fairly straight forward: isolate and collect the logs. Everyone has their own methods I guess. Some OS'es require you leave the system connected before collecting logs this book does not cover that aspect. Not everyone can afford a SANS course so in that respect this condensed field guide is a plus+. Simply put; you cannot afford to not have this book. A must buy.
L**N
Five Stars - Version 2 update very nice
Update - version 3.0 has soooo much more depth. Really nice update. Solid info, brief and informative, wide coverage on incident issues. Bought a second copy recently (gave away #1), have read through it, and the update does improve wording, fixes the few spelling errors someone complained about in V1, and has great packet header charts in the back. Got my copy autographed at a SANS conference to boot! I hear there are more titles in the series planned with a few underway.
C**A
Must have book for Incident Responders
This little pocket book is absolutely a must have for Incident responders. It will provide some wonderful insight on what should be done in all the stages of traditional IR. A must have!
J**.
Incredibly Useful. Repurchased for version 2.0
I was recommended this Handbook by an Incident Responder with over 10 years experience (whom was also recommended it within his professional network). I've been utilizing version 1.0 of this handbook for almost 3 months now and, I must say, it's the perfect field manual not only for Incident Responders but for any class of Information Security Professional. Back in college I started crafting a reference manual of my own wishing I had something like this. I'm happy to see that I wasn't the only person when I was recommended this Handbook. Initially my only wish was for it to have had reference diagrams for common packet headers. However, shortly after that I learned of version 2.0. For that reason, I immediately purchased version 2.0. Background: 3 years experience as an Information Security Analyst
E**N
Not Perfectly Pocket Size, but Sufficient
Fits in the jump bag & a zip lock to protect the pages - Crafted my own pocket flap inserts to add personal notes for my employer on large index cards (org chart by title with penciled in names, numbers & schedules); IT LAN map with details on each system in case it is needed in a jiff (except passwords - don't be stupid!) It didn't help me pass the minors, but I am a non-military female. I don't think God could have gotten me through those men who love to fail women!
A**I
Good reading
Great book as a guide
A**R
As the name suggests, a condensed field guide
This book is quite good. Condensed commands and references to what needs to be looked at from an Incident Response perspective. I would highly recommend this to anyone willing to add to their knowledge. Please be aware, this book is not for learning Incident Response, but for bring a structure to how you handle these incidents/cases.
M**O
Ottimo libro sulla sicurezza informatica
Questo libro ha lo scopo di fornire un approccio rapido verso la difesa da eventuali attacchi informatici. Offre diversispunti per mettere insiemeuna procedura per definire/catalogare l'incidente fino ad offrire comandi e software per scoprire chi, come e quando è riuscito a creare una breccia nel sistema. Sono ancora ai primi capitoli, ma giá da lì ho scoperto alcune vulnerabilità di cui non ero a conoscenza. Con poche direttive aggiunte ad apache, ho un sistema più sicuro. Davvero, gli spunti e gli strumenti per analizzare la propria infrastruttura sono molti. Più lo leggo, più mi appassiono al versante "sicurezza". Consigliato a chi gestisce server e reti aziendali. Essendo un libriccino veloce, non si può dire di non avere tempo per leggerlo!
D**.
Reall the context shared in this guide is good, SANS guys always deliver quality.
Really great SOC uses-cases, very good to start guide for SOC engineers/managers. Great indepth coverage of basics and concepts critical for SOC/SIEM/D&R guys. Would really recommend this book to OT Cybersecurity Engineers or anyone from cys detection. As you can see from TOC, the micro topics, are covered, basics are always so critical in cybersecurity field. If you cannot apply fundamental into your program/projects, it's no use. So do get this guide. Handy and easy to digest! Highly recommended! :) cheers!
M**A
A real must have for all guys involved in cyber security
A real must have for all those involved in IR procedures design, a very useful summary for those who work in cyber security in general and want to have a
Trustpilot
3 weeks ago
3 weeks ago