£38.48

O'Reilly Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams

Price data last checked 135 day(s) ago - refreshing...

View at Amazon

We'll watch every seller, every day. One email when your price arrives.

This is the usual price. Wait for it to drop, or tell us your number.

£38 today · usual range £0–£0 · best ever £34

NEW HERE?

Amazon shows you one price. We show you all of them.

Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.

WHAT'S ON THIS PAGE

↓ Price chart
when this has been cheap or pricey
↓ Forecast
where the price is heading next
↓ Statistics
all-time high & low, recent range
↑ Price alert
name your number, we'll email you

Price History & Forecast

Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.

Last 68 days • 68 data points (No recent data available)

Historical
Generating forecast...
£44.18 £33.11 £35.53 £37.94 £40.36 £42.77 £45.19 02 November 2025 18 November 2025 05 December 2025 22 December 2025 08 January 2026

Price Distribution

Price distribution over 68 days • 6 price levels

Days at Price
Current Price
10 days 30 days · current 2 days 5 days 19 days 2 days 0 8 15 23 30 £34 £38 £41 £42 £43 £44 Days at Price

Price Analysis

Most common price: £38 (30 days, 44.1%)

Price range: £34 - £44

Price levels: 6 different prices over 68 days

Description

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. You'll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations and provides a common language that's standardized and accessible to everyone. You'll learn how to: Map cyber threat intelligence to ATT&CK Define adversary emulation goals and objectives Research adversary emulation TTPs using the ATT&CK knowledge base Plan and conduct adversary emulation and communicate your findings Automate adversary emulation to support repeatable testing Execute FIN6, APT3, and APT29 emulation plans

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
16 May 2025
Listed Since
02 December 2023

Barcode

No barcode data available

Similar Products You Might Like

Cyber-Security Threats, Actors, and Dynamic Mitigation
96% match

Cyber-Security Threats, Actors, and Dynamic Mitigation

CRC Press

£99.00 11 Apr 2026
Malware Analysis Techniques: Tricks for the triage of adversarial software
96% match

Malware Analysis Techniques: Tricks for the triage of adversarial software

Packt Publishing

£39.99 09 Apr 2026
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
96% match

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

Packt Publishing

£41.99 15 Feb 2026
Threat Modeling: Designing for Security
96% match

Threat Modeling: Designing for Security

Wiley

£45.99 18 Mar 2026
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
96% match

Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing

£97.52 06 Jan 2026
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
95% match

Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats

Kogan Page

£70.38 06 Jan 2026
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
95% match

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Wiley

£78.13 17 Mar 2026
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking
95% match

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking

CRC Press

£41.39 09 Feb 2026
Attack Vectors: The History of Cybersecurity
95% match

Attack Vectors: The History of Cybersecurity

Apress

£40.62 24 Feb 2026
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition (NETWORKING & COMM - OMG)
95% match

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition (NETWORKING & COMM - OMG)

McGraw-Hill Education

£41.18 09 Feb 2026
The Operational Excellence Library; Mastering Pen Testing
95% match

The Operational Excellence Library; Mastering Pen Testing

£74.97 13 Feb 2026
Versatile Cybersecurity: 72 (Advances in Information Security, 72)
95% match

Versatile Cybersecurity: 72 (Advances in Information Security, 72)

Springer

£114.79 26 Jan 2026
CRC Press Intrusion Detection Networks - Collaborative Security
95% match

CRC Press Intrusion Detection Networks - Collaborative Security

CRC Press

£120.00 19 Apr 2026
Cyber Threat Hunting
95% match

Cyber Threat Hunting

Manning

£36.00 22 Jan 2026
MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics
95% match

MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics

£48.03 20 Apr 2026
Springer AI in Cybersecurity: 151 Intelligent Systems Library
95% match

Springer AI in Cybersecurity: 151 Intelligent Systems Library

Springer

£127.82 18 Apr 2026
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)
95% match

Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)

Artech House

£85.00 09 Mar 2026
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
95% match

Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

Syngress

£41.19 15 Feb 2026
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
95% match

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

£47.86 13 Jan 2026
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats: 54 (Advances in Information Security, 54)
95% match

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats: 54 (Advances in Information Security, 54)

Springer

£92.36 01 Mar 2026
Red Team Engineering: The Art of Building Offensive Tools and Infrastructure
95% match

Red Team Engineering: The Art of Building Offensive Tools and Infrastructure

No Starch Press

£71.99 25 Jan 2026
Advanced Malware Analysis (NETWORKING & COMM - OMG)
95% match

Advanced Malware Analysis (NETWORKING & COMM - OMG)

McGraw-Hill Education

£38.53 06 Mar 2026
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
95% match

Building a Cyber Risk Management Program: Evolving Security for the Digital Age

O'Reilly

£34.38 24 Feb 2026
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
95% match

Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity

Packt Publishing

£41.99 11 Jan 2026