| Titre : | Cyber threat intelligence | | Type de document : | texte imprimé | | Auteurs : | Martin Lee, Auteur | | Editeur : | John Wiley & Sons, Inc., Hoboken, New Jersey. | | Année de publication : | 2023 | | Importance : | xix, 277 pages | | Présentation : | illustrations | | Format : | 24 cm | | ISBN/ISSN/EAN : | 978-1-11-986174-4 | | Langues : | Anglais (eng) | | Catégories : | 005 Computer programming, programs, data
| | Mots-clés : | Cyber threat intelligence | | Index. décimale : | 005.8 | | Résumé : | "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"-- Provided by publisher |
Cyber threat intelligence [texte imprimé] / Martin Lee, Auteur . - [S.l.] : John Wiley & Sons, Inc., Hoboken, New Jersey., 2023 . - xix, 277 pages : illustrations ; 24 cm. ISBN : 978-1-11-986174-4 Langues : Anglais ( eng) | Catégories : | 005 Computer programming, programs, data
| | Mots-clés : | Cyber threat intelligence | | Index. décimale : | 005.8 | | Résumé : | "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"-- Provided by publisher |
|