Cyber threat intelligence / Martin Lee.
Material type: Computer filePublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., 2023Copyright date: ©2023Description: 1 online resource (xx, 285 pages)Content type:- text
- computer
- online resource
- 9781119861751
- TK5105.59 .L44 2023
Item type | Current library | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Online Resource | UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية | Link to resource | Not for loan |
Includes bibliographical references and index.
Chapter 1: Introduction -- Chapter 2: Threat Environment -- Chapter 3: Applying Intelligence -- Chapter 4: Collecting Intelligence -- Chapter 5: Generating Intelligence -- Chapter 6: Attribution -- Chapter 7: Professionalism -- Chapter 8: Future Threats and Conclusion -- Chapter 9 Case Studies.
"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.