Titre : | Cyber threat intelligence | Type de document : | texte imprimé | Auteurs : | Martin Lee, Auteur | Editeur : | John Wiley & Sons, Inc., Hoboken, New Jersey. | Année de publication : | 2023 | Importance : | xix, 277 pages | Présentation : | illustrations | Format : | 24 cm | ISBN/ISSN/EAN : | 978-1-11-986174-4 | Langues : | Anglais (eng) | Catégories : | 005 Computer programming, programs, data
| Mots-clés : | Cyber threat intelligence | Index. décimale : | 005.8 | Résumé : | "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"-- Provided by publisher |
Cyber threat intelligence [texte imprimé] / Martin Lee, Auteur . - [S.l.] : John Wiley & Sons, Inc., Hoboken, New Jersey., 2023 . - xix, 277 pages : illustrations ; 24 cm. ISBN : 978-1-11-986174-4 Langues : Anglais ( eng) Catégories : | 005 Computer programming, programs, data
| Mots-clés : | Cyber threat intelligence | Index. décimale : | 005.8 | Résumé : | "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"-- Provided by publisher |
|