|
|
|
|
| LEADER |
00000cam a2200000 7i4500 |
| 001 |
0000090715 |
| 005 |
20200708.0 |
| 008 |
170529s2015 mau eng |
| 020 |
|
|
|a 9780128027301
|
| 040 |
|
|
|a UniSZA
|e rda
|
| 050 |
0 |
0 |
|a HV6773
|b .D35 2015
|
| 090 |
0 |
0 |
|a HV6773
|b .D35 2015
|
| 100 |
1 |
|
|a Dalziel, Henry ,
|e author
|
| 245 |
1 |
0 |
|a How to define and build an effective cyber threat intelligence capability
|c Henry Dalziel
|
| 264 |
|
1 |
|a Waltham, Massachusetts :
|b Elsevier
|c c2015
|
| 300 |
|
|
|a iv, 32 pages :
|b illustration ;
|c 23 cm.
|
| 336 |
|
|
|a text
|2 rdacontent
|
| 337 |
|
|
|a unmediated
|2 rdamedia
|
| 338 |
|
|
|a volume
|2 rdacarrier
|
| 505 |
0 |
|
|a 1. A problem well-defined is half-solved -- 2. Defining business objectives or "start with why" -- 3. Common objectives of a threat intelligence program -- 4. Translating objectives into needs. "Why drives what" -- 5. How technology models operationalize threat data -- 6. Who: given why, what, and how, how you can ask where to get it
|
| 520 |
|
|
|a One of the most important concepts in the world of information security today is defining and building an effective cyber threat intelligence capability. Covers the keys to successful implementation and discusses who are the right vendors, partners, or employees to build, staff, and run your cyber threat intelligence program
|
| 650 |
|
0 |
|a Computer crimes
|z United States
|x Prevention
|
| 650 |
|
0 |
|a Computer networks
|x Security measures
|z United States
|
| 650 |
|
0 |
|a Cyber intelligence (Computer security)
|z United States
|
| 650 |
|
0 |
|a Cyberterrorism
|z United States
|x Prevention
|
| 650 |
|
0 |
|a National security
|z United States
|
| 856 |
4 |
2 |
|3 Publisher description
|u https://www.loc.gov/catdir/enhancements/fy1619/2016449084-d.html
|
| 999 |
|
|
|a 1000169686
|b Book
|c OPEN SHELF (30 DAYS)
|e Tembila Campus
|