Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Book
%1 thompson2018cybersecurity
%A Thompson, Eric C.
%D 2018
%K incident response
%T Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents
@book{thompson2018cybersecurity,
added-at = {2019-04-08T20:34:48.000+0200},
author = {Thompson, Eric C.},
biburl = {https://www.bibsonomy.org/bibtex/269fa1d43965c5a2b17ea65dfc48d0366/spiider},
interhash = {74786e7b093e65edc6576dca136886b8},
intrahash = {69fa1d43965c5a2b17ea65dfc48d0366},
keywords = {incident response},
timestamp = {2019-04-08T20:34:48.000+0200},
title = {Cybersecurity Incident Response - How to Contain, Eradicate, and Recover from Incidents},
year = 2018
}