How to define and build an effective cyber threat intelligence capability /
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress, an imprint of Elsevier,
[2015]
©2015 |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn898422494 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 141220t20152015maua o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d N$T |d UIU |d OCLCQ |d YDXCP |d TEFOD |d OCLCF |d WAU |d B24X7 |d DEBSZ |d COO |d OCLCQ |d TEFOD |d DEBBG |d OCLCQ |d LIV |d MERUC |d U3W |d D6H |d S4S |d AU@ |d OCLCQ |d WYU |d CUY |d LOA |d ZCU |d CNCEN |d ICG |d VT2 |d DKC |d OCLCQ |d C6I |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 899277599 |a 920816045 |a 1066502985 |a 1081106420 |a 1083606286 |a 1088961105 |a 1129345045 | ||
020 | |a 9780128027523 |q (electronic bk.) | ||
020 | |a 0128027525 |q (electronic bk.) | ||
020 | |z 9780128027301 | ||
020 | |z 0128027304 | ||
029 | 1 | |a CHNEW |b 001012648 | |
029 | 1 | |a DEBBG |b BV043216220 | |
029 | 1 | |a DEBBG |b BV043615716 | |
029 | 1 | |a DEBSZ |b 431869235 | |
029 | 1 | |a DEBSZ |b 43413774X | |
029 | 1 | |a DEBSZ |b 453673139 | |
029 | 1 | |a GBVCP |b 817111808 | |
035 | |a (OCoLC)898422494 |z (OCoLC)899277599 |z (OCoLC)920816045 |z (OCoLC)1066502985 |z (OCoLC)1081106420 |z (OCoLC)1083606286 |z (OCoLC)1088961105 |z (OCoLC)1129345045 | ||
037 | |a 9C3F9764-E402-4B5B-8FAD-4D9F6C67F597 |b OverDrive, Inc. |n http://www.overdrive.com | ||
043 | |a n-us--- | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Dalziel, Henry, |e author. | |
245 | 1 | 0 | |a How to define and build an effective cyber threat intelligence capability / |c Henry Dalziel. |
260 | |a Waltham, MA : |b Syngress, an imprint of Elsevier, |c [2015] | ||
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (11 unnumbered pages, 32 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed Apr 1, 2015). | |
520 | |a Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. | ||
505 | 0 | |a A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it. | |
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
758 | |i has work: |a How to define and build an effective cyber threat intelligence capability (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGTTJqvx7Q3bDfTCf99jyd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Erscheint auch als: |n Druck-Ausgabe |a Dalziel, Henry. How to Define and Build an Effective Cyber Threat Intelligence Capability . |t How to Understand, Justify and Implement a New Approach to Security |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1888755 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780128027301/?ar |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00078688 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1888755 | ||
938 | |a EBSCOhost |b EBSC |n 924921 | ||
938 | |a YBP Library Services |b YANK |n 12206726 | ||
994 | |a 92 |b IZTAP |