How to define and build an effective cyber threat intelligence capability / Henry Dalziel ; [contributing editors, Eric Olson, James Carnall].
Material type: TextPublication details: New York: Elsevier, 2015Description: iv, 32 pages : illustrations ; 23 cmISBN:- 9780128027301
- 0128027304
- Cyber intelligence (Computer security) -- United States
- Cyberterrorism -- United States -- Prevention
- Computer networks -- Security measures -- United States
- Computer crimes -- United States -- Prevention
- National security -- United States
- Computer crimes -- Prevention
- Computer networks -- Security measures
- Cyber intelligence (Computer security)
- Cyberterrorism -- Prevention
- National security
- United States
- HV6773 DAL 2015
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books in General collection | Mzuzu University Library and Learning Resources Centre | Non-fiction | HV 6773 DAL 2015 (Browse shelf(Opens below)) | 14233 | Available | MzULM-014233 |
Browsing Mzuzu University Library and Learning Resources Centre shelves, Collection: Non-fiction Close shelf browser (Hides shelf browser)
HV 6432 ROG 2008 Why we're losing the war on terror / | HV 6432 ROG 2008 Why we're losing the war on terror / | HV 6433 CRO 2012 Securitizing Islam : | HV 6773 DAL 2015 How to define and build an effective cyber threat intelligence capability / | HV 7436 COO 2014 The gun debate : | HV 7935 ALY 2009 Lengthening the arm of the law : | HV 7935 ALY 2009 Lengthening the arm of the law : |
A problem well-defined is half-solved -- Defining business objectives or "start with why" -- Common objectives of a threat intelligence program -- Translating objectives into needs. "Why drives what" -- How technology models operationalize threat data -- Who: given why, what, and how, how you can ask where to get it.
One of the most important concepts in the world of information security today is defining and building an effective cyber threat intelligence capability. Covers the keys to successful implementation and discusses who are the right vendors, partners, or employees to build, staff, and run your cyber threat intelligence program.
There are no comments on this title.