How to define and build an effective cyber threat intelligence capability /
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress, an imprint of Elsevier,
[2015]
�2015 |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn898422494 | ||
003 | OCoLC | ||
005 | 20231120111927.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 141220t20152015maua o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d N$T |d UIU |d OCLCQ |d YDXCP |d TEFOD |d OCLCF |d WAU |d B24X7 |d DEBSZ |d COO |d OCLCQ |d TEFOD |d DEBBG |d OCLCQ |d LIV |d MERUC |d U3W |d D6H |d S4S |d AU@ |d OCLCQ |d WYU |d CUY |d LOA |d ZCU |d CNCEN |d ICG |d VT2 |d DKC |d OCLCQ |d C6I |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 899277599 |a 920816045 |a 1066502985 |a 1081106420 |a 1083606286 |a 1088961105 |a 1129345045 | ||
020 | |a 9780128027523 |q (electronic bk.) | ||
020 | |a 0128027525 |q (electronic bk.) | ||
020 | |z 9780128027301 | ||
020 | |z 0128027304 | ||
035 | |a (OCoLC)898422494 |z (OCoLC)899277599 |z (OCoLC)920816045 |z (OCoLC)1066502985 |z (OCoLC)1081106420 |z (OCoLC)1083606286 |z (OCoLC)1088961105 |z (OCoLC)1129345045 | ||
043 | |a n-us--- | ||
050 | 4 | |a TK5105.59 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Dalziel, Henry, |e author. | |
245 | 1 | 0 | |a How to define and build an effective cyber threat intelligence capability / |c Henry Dalziel. |
260 | |a Waltham, MA : |b Syngress, an imprint of Elsevier, |c [2015] | ||
264 | 4 | |c �2015 | |
300 | |a 1 online resource (11 unnumbered pages, 32 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed Apr 1, 2015). | |
520 | |a Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. | ||
505 | 0 | |a A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a R�eseaux d'ordinateurs |x S�ecurit�e |x Mesures. |0 (CaQQLa)201-0263812 | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast |0 (OCoLC)fst00872341 | |
776 | 0 | 8 | |i Erscheint auch als: |n Druck-Ausgabe |a Dalziel, Henry. How to Define and Build an Effective Cyber Threat Intelligence Capability . |t How to Understand, Justify and Implement a New Approach to Security |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9780128027301 |z Texto completo |