Amazon cover image
Image from Amazon.com

Cyber threat intelligence / Martin Lee.

By: Material type: TextTextPublication details: Oxford, UK ; Hoboken, NJ, USA : Wiley, c 2023.Description: xx, 284 p.: ill,; 27 cmISBN:
  • 9781119861744
Subject(s): Additional physical formats: Online version:: Cyber threat intelligenceDDC classification:
  • 005.87 23 LEE-C 2023 791056
Summary: "This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Books Books Faculty of Information Technology Book Cart Book 005.87 LEE-C 2023 791056 (Browse shelf(Opens below)) 1 Available 791056
Books Books Faculty of Information Technology Book Cart Book 005.87 LEE-C 2023 791057 (Browse shelf(Opens below)) 2 Available 791057
Books Books Faculty of Information Technology Book Cart Book 005.87 LEE-C 2023 791058 (Browse shelf(Opens below)) 3 Available 791058
Total holds: 0

Includes bibliographical references and index.

"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On one side of the table was myself, a software engineer who had fallen into the domain of cyber security more or less by accident. On the other was a uniformed senior military intelligence officer. A shared professional interest in cyber threat intelligence had led to us being invited to the same event"--

Powered by Koha