語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Practical cyber threat intelligence = gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Practical cyber threat intelligence / Dr. Erdal Ozkaya.
其他題名:
gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /
作者:
Ozkaya, Dr. Erdal.
面頁冊數:
1 online resource (454 pages)
標題:
COMPUTERS / Security / Network Security. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000320.html
ISBN:
9789355510297
Practical cyber threat intelligence = gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /
Ozkaya, Dr. Erdal.
Practical cyber threat intelligence
gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /[electronic resource] :Dr. Erdal Ozkaya. - 1 online resource (454 pages)
Includes bibliographical references and index.
Practical cyber threat intelligence : gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Basics of Threat Analysis and Modeling -- Chapter 2: Formulate a Threat Intelligence Model -- Chapter 3: Adversary Data Collection Sources & Methods -- Chapter 4: Pivot Off and Extracting Adversarial Data -- Chapter 5: Primary Indicators of Security Compromise -- Chapter 6: Identify & Build Indicators of Compromise -- Chapter 7: Conduct Threat Assessments In Depth -- Chapter 8: Produce Heat Maps,Infographics & Dashboards -- Chapter 9: Build Reliable & Robust Threat Intelligence System -- Chapter 10: Learn Statistical Approaches for Threat Intelligence -- Chapter 11: Develop Analytical Skills for Complex Threats -- Chapter 12: Planning for Disaster -- Index.
Access restricted to authorized users and institutions.
This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information. The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.
Mode of access: World Wide Web.
ISBN: 9789355510297Subjects--Topical Terms:
1483836
COMPUTERS / Security / Network Security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105
Dewey Class. No.: 005.8
Practical cyber threat intelligence = gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /
LDR
:02857nam a2200289 i 4500
001
1157300
006
m eo d
007
cr cn |||m|||a
008
250717s2022 ob 000 0 eng d
020
$a
9789355510297
020
$a
9789355510372
035
$a
BPB0000320
041
0
$a
eng
050
0 0
$a
TK5105
082
0 0
$a
005.8
100
1
$a
Ozkaya, Dr. Erdal.
$3
1483883
245
1 0
$a
Practical cyber threat intelligence
$h
[electronic resource] :
$b
gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices /
$c
Dr. Erdal Ozkaya.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2022.
264
4
$c
©2022
300
$a
1 online resource (454 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Practical cyber threat intelligence : gather, process, and analyze threat actor motives, targets, and attacks with cyber intelligence practices -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1: Basics of Threat Analysis and Modeling -- Chapter 2: Formulate a Threat Intelligence Model -- Chapter 3: Adversary Data Collection Sources & Methods -- Chapter 4: Pivot Off and Extracting Adversarial Data -- Chapter 5: Primary Indicators of Security Compromise -- Chapter 6: Identify & Build Indicators of Compromise -- Chapter 7: Conduct Threat Assessments In Depth -- Chapter 8: Produce Heat Maps,Infographics & Dashboards -- Chapter 9: Build Reliable & Robust Threat Intelligence System -- Chapter 10: Learn Statistical Approaches for Threat Intelligence -- Chapter 11: Develop Analytical Skills for Complex Threats -- Chapter 12: Planning for Disaster -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information. The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000320.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入