صورة الغلاف المحلية
صورة الغلاف المحلية
عرض عادي

Cyber threat intelligence / Martin Lee.

بواسطة:نوع المادة : ملف الحاسوبملف الحاسوبالناشر:Hoboken, New Jersey : John Wiley & Sons, Inc., 2023تاريخ حقوق النشر: ©2023وصف:1 online resource (xx, 285 pages)نوع المحتوى:
  • text
نوع الوسائط:
  • computer
نوع الناقل:
  • online resource
تدمك:
  • 9781119861751
الموضوع:النوع/الشكل:تصنيف مكتبة الكونجرس:
  • TK5105.59 .L44 2023
المحتويات:
Chapter 1: Introduction -- Chapter 2: Threat Environment -- Chapter 3: Applying Intelligence -- Chapter 4: Collecting Intelligence -- Chapter 5: Generating Intelligence -- Chapter 6: Attribution -- Chapter 7: Professionalism -- Chapter 8: Future Threats and Conclusion -- Chapter 9 Case Studies.
ملخص:"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"
قوائم هذه المادة تظهر في: Electronic Books | الكتب الإلكترونية
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رابط URL حالة تاريخ الإستحقاق الباركود
مصدر رقمي مصدر رقمي UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية رابط إلى المورد لا يعار

Includes bibliographical references and index.

Chapter 1: Introduction -- Chapter 2: Threat Environment -- Chapter 3: Applying Intelligence -- Chapter 4: Collecting Intelligence -- Chapter 5: Generating Intelligence -- Chapter 6: Attribution -- Chapter 7: Professionalism -- Chapter 8: Future Threats and Conclusion -- Chapter 9 Case Studies.

"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

اضغط على الصورة لمشاهدتها في عارض الصور

صورة الغلاف المحلية
شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة