How to define and build an effective cyber threat intelligence capability

Verfasser / Beitragende:
Henry Dalziel ; [contributing editors, Eric Olson, James Carnall]
Ort, Verlag, Jahr:
Amsterdam, Waltham, MA : Syngress, an imprint of Elsevier, 2015
Beschreibung:
1 online resource (iv, 32 pages) : illustrations
Format:
Buch (online)
ID: 528906534
LEADER cam a22 4500
001 528906534
003 CHVBK
005 20201014102816.0
006 m d
007 cr |n ||||||||
008 160721s2015 enka s 000 0 eng d
010 |a  2016449084 
020 |a 978-0-12-802730-1  |q (paperback) 
020 |a 0-12-802730-4  |q (paperback) 
035 |a (SERSOL)ssj0001455375 
035 |a (WaSeSS)ssj0001455375 
040 |a BTCTA  |b eng  |c BTCTA  |d YDXCP  |d DMF  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d IBI  |d OCLCO  |d DLC  |d WaSeSS  |e rda 
050 0 0 |a HV6773  |b .D35 2015 
100 1 |a Dalziel  |D Henry  |e [author] 
245 1 0 |a How to define and build an effective cyber threat intelligence capability  |c Henry Dalziel ; [contributing editors, Eric Olson, James Carnall] 
264 1 |a Amsterdam  |a Waltham, MA  |b Syngress, an imprint of Elsevier  |c [2015] 
300 |a 1 online resource (iv, 32 pages)  |b illustrations 
336 |a text  |b txt  |2 rdacontent/eng 
337 |a computer  |b c  |2 rdamedia/eng 
338 |a online resource  |b cr  |2 rdacarrier/eng 
505 0 |a A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it. 
506 |a Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access. 
520 |a One of the most important concepts in the world of information security today is defining and building an effective cyber threat intelligence capability. Covers the keys to successful implementation and discusses who are the right vendors, partners, or employees to build, staff, and run your cyber threat intelligence program. 
650 0 |a Cyber intelligence (Computer security)  |z United States 
650 0 |a Cyberterrorism  |z United States  |x Prevention 
650 0 |a Computer networks  |x Security measures  |z United States 
650 0 |a Computer crimes  |z United States  |x Prevention 
650 0 |a National security  |z United States 
650 7 |a Computer crimes  |x Prevention  |0 (OCoLC)fst00872068  |2 fast 
650 7 |a Computer networks  |x Security measures  |0 (OCoLC)fst00872341  |2 fast 
650 7 |a Cyber intelligence (Computer security)  |0 (OCoLC)fst01893401  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |0 (OCoLC)fst01905567  |2 fast 
650 7 |a National security  |0 (OCoLC)fst01033711  |2 fast 
651 7 |a United States  |0 (OCoLC)fst01204155  |2 fast 
700 1 |a Olson  |D Eric  |e contributing editor 
700 1 |a Carnall  |D James  |e contributing editor 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128027301/?ar  |z Uni Basel: Volltext 
856 4 0 |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=1888755  |z Uni Bern: Volltext 
898 |a BK020053  |b XK020053  |c XK020000 
909 4 |f O'Reilly Safari Learning Platform: Academic edition 
909 4 |a E-Books von 360MarcUpdates 
909 4 |f Ebook Central All Subscribed Titles 
949 |B IDSBB  |F A145  |b A145  |c 145VT  |x NELA1452007 
949 |B IDSBB  |F B405  |b B405  |c 405VT  |x NELB4051809 
950 |B IDSBB  |P 100  |E 1-  |a Dalziel  |D Henry  |e [author] 
950 |B IDSBB  |P 700  |E 1-  |a Olson  |D Eric  |e contributing editor 
950 |B IDSBB  |P 700  |E 1-  |a Carnall  |D James  |e contributing editor 
950 |B IDSBB  |P 856  |E 40  |u https://learning.oreilly.com/library/view/~/9780128027301/?ar  |z Uni Basel: Volltext 
950 |B IDSBB  |P 856  |E 40  |u https://ebookcentral.proquest.com/lib/unibern/detail.action?docID=1888755  |z Uni Bern: Volltext 
986 |a SWISSBIB  |b 336334427