Practical Cyber Intelligence : How action-based intelligence can be an effective response to incidents / Wilson Bautista Jr.
Copyright date: ©2018Description: 300 pages : illustrations. 24cmContent type:- text
- 9781788835244
- 1788835247
- Computers -- Cybernetics
- Cyber intelligence (Computer security)
- Cyberterrorism -- Prevention
- Computer networks -- Security measures
- Information technology -- Security measures
- Computer crimes -- Prevention
- COMPUTERS / Security / General
- Computer crimes -- Prevention
- Computer networks -- Security measures
- Cyber intelligence (Computer security)
- Cyberterrorism -- Prevention
- Information technology -- Security measures
- Computers -- Security -- Cryptography
- Cybernetics & systems theory
- Coding theory & cryptology
- Data encryption
- Computers -- Computer Science
- Computer science
- 005.8 23
- HV6773
Item type | Current library | Shelving location | Call number | URL | Copy number | Status | Date due | Barcode | Course reserves | |
---|---|---|---|---|---|---|---|---|---|---|
BOOK GPS | FRANCIS LIGHT LIBRARY | Link to resource | Not for loan | |||||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 BAU (Browse shelf(Opens below)) | 1 | Available | 00000545 | ||||
ACADEMIC | FRANCIS LIGHT LIBRARY | SHELVES 1 | 005.8 BAU (Browse shelf(Opens below)) | 2 | Available | 00000524 |
Browsing FRANCIS LIGHT LIBRARY shelves, Shelving location: SHELVES 1 Close shelf browser (Hides shelf browser)
Table of ContentsThe Need for Cyber IntelligenceIntelligence DevelopmentIntegrating Cyber Intel, Security, and OperationsUsing Cyber Intelligence to Enable Active DefenseF3EAD For You and For MeIntegrating Threat Intelligence and OperationsCreating the Collaboration CapabilityThe Security StackDriving Cyber IntelBaselines and AnomaliesPutting Out the FiresVulnerability ManagementRisky BusinessAssigning MetricsPutting It All Together.
Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.
There are no comments on this title.