Cyber threat intelligence (Record no. 1669)

MARC details
000 -LEADER
fixed length control field 03106nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250716112631.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250716b2023|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119861751
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.87
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Lee, Martin
Relator term Author
245 ## - TITLE STATEMENT
Title Cyber threat intelligence
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2023.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xx, 284p.
500 ## - GENERAL NOTE
General note CYBER THREAT INTELLIGENCE<br/>“Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when you know.”<br/>—Simon Edwards, Security Testing Expert, CEO SE Labs Ltd., Chair AMTSO<br/><br/>Effective introduction to cyber threat intelligence, supplemented with detailed case studies and after action reports of intelligence on real attacks<br/><br/>Cyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view. The author takes a systematic, system-agnostic, and holistic view to generating, collecting, and applying threat intelligence.<br/><br/>The text covers the threat environment, malicious attacks, collecting, generating, and applying intelligence and attribution, as well as legal and ethical considerations. It ensures readers know what to look out for when considering a potential cyber attack and imparts how to prevent attacks early on, explaining how threat actors can exploit a system’s vulnerabilities. It also includes analysis of large scale attacks such as WannaCry, NotPetya, Solar Winds, VPNFilter, and the Target breach, looking at the real intelligence that was available before and after the attack.<br/><br/>Topics covered in Cyber Threat Intelligence include:<br/><br/>The constant change of the threat environment as capabilities, intent, opportunities, and defenses change and evolve<br/>Different business models of threat actors, and how these dictate the choice of victims and the nature of their attacks<br/>Planning and executing a threat intelligence programme to improve an organistation’s cyber security posture<br/>Techniques for attributing attacks and holding perpetrators to account for their actions<br/>Cyber Threat Intelligence describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, particularly if they wish to develop a career in intelligence, and as a reference for those already working in the area.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Collecting Intelligence and Generating Intelligence
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Threat Environment and Applying Intelligence
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Future Threats and Conclusion
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10124066
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) 005.87 (Online Access) EB0097 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha