Local cover image
Local cover image
Normal view

Cyber threat intelligence / Martin Lee.

By: Material type: Computer fileComputer filePublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., 2023Copyright date: ©2023Description: 1 online resource (xx, 285 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119861751
Subject(s): Genre/Form: LOC classification:
  • TK5105.59 .L44 2023
Contents:
Chapter 1: Introduction -- Chapter 2: Threat Environment -- Chapter 3: Applying Intelligence -- Chapter 4: Collecting Intelligence -- Chapter 5: Generating Intelligence -- Chapter 6: Attribution -- Chapter 7: Professionalism -- Chapter 8: Future Threats and Conclusion -- Chapter 9 Case Studies.
Summary: "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"
List(s) this item appears in: Electronic Books | الكتب الإلكترونية
Holdings
Item type Current library Call number URL Status Date due Barcode
Online Resource Online Resource UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية Link to resource Not for loan

Includes bibliographical references and index.

Chapter 1: Introduction -- Chapter 2: Threat Environment -- Chapter 3: Applying Intelligence -- Chapter 4: Collecting Intelligence -- Chapter 5: Generating Intelligence -- Chapter 6: Attribution -- Chapter 7: Professionalism -- Chapter 8: Future Threats and Conclusion -- Chapter 9 Case Studies.

"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

Click on an image to view it in the image viewer

Local cover image
Share

Abu Dhabi, United Arab Emirates

reference@ecssr.ae

+97124044780

Copyright © 2024 Emirates Center for Strategic Studies and Research All Rights Reserved