Image from Google Jackets

How to define and build an effective cyber threat intelligence capability / Henry Dalziel ; [contributing editors, Eric Olson, James Carnall].

By: Contributor(s): Material type: TextTextPublication details: New York: Elsevier, 2015Description: iv, 32 pages : illustrations ; 23 cmISBN:
  • 9780128027301
  • 0128027304
Subject(s): LOC classification:
  • HV6773 DAL 2015
Online resources:
Contents:
A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it.
Summary: One of the most important concepts in the world of information security today is defining and building an effective cyber threat intelligence capability. Covers the keys to successful implementation and discusses who are the right vendors, partners, or employees to build, staff, and run your cyber threat intelligence program.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books in General collection Books in General collection Mzuzu University Library and Learning Resources Centre Non-fiction HV 6773 DAL 2015 (Browse shelf(Opens below)) 14233 Available MzULM-014233

A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it.

One of the most important concepts in the world of information security today is defining and building an effective cyber threat intelligence capability. Covers the keys to successful implementation and discusses who are the right vendors, partners, or employees to build, staff, and run your cyber threat intelligence program.

There are no comments on this title.

to post a comment.

Powered by Koha