Operationalizing threat intelligence:
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-sour...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2022
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781837632879/?ar |
Zusammenfassung: | Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production. Audience This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) |
Umfang: | 1 Online-Ressource (1 audio file (11 hr., 43 min.)) |
ISBN: | 9781837632879 1837632871 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-089795059 | ||
003 | DE-627-1 | ||
005 | 20240228121917.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230322s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781837632879 |c electronic audio bk. |9 978-1-83763-287-9 | ||
020 | |a 1837632871 |c electronic audio bk. |9 1-83763-287-1 | ||
035 | |a (DE-627-1)089795059 | ||
035 | |a (DE-599)KEP089795059 | ||
035 | |a (ORHE)9781837632879 | ||
035 | |a (DE-627-1)089795059 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230131 | |
100 | 1 | |a Wilhoit, Kyle |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Operationalizing threat intelligence |c Kyle Wilhoit, Joseph Opacki |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2022 | |
300 | |a 1 Online-Ressource (1 audio file (11 hr., 43 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) | ||
520 | |a Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production. Audience This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Opacki, Joseph |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781837632879/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-089795059 |
---|---|
_version_ | 1821494815538282496 |
adam_text | |
any_adam_object | |
author | Wilhoit, Kyle Opacki, Joseph |
author_facet | Wilhoit, Kyle Opacki, Joseph |
author_role | aut aut |
author_sort | Wilhoit, Kyle |
author_variant | k w kw j o jo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)089795059 (DE-599)KEP089795059 (ORHE)9781837632879 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03658cam a22004452 4500</leader><controlfield tag="001">ZDB-30-ORH-089795059</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121917.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230322s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781837632879</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-83763-287-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1837632871</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-83763-287-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089795059</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089795059</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781837632879</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089795059</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230131</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilhoit, Kyle</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Operationalizing threat intelligence</subfield><subfield code="c">Kyle Wilhoit, Joseph Opacki</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 audio file (11 hr., 43 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 31, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production. Audience This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Opacki, Joseph</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781837632879/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-089795059 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:22Z |
institution | BVB |
isbn | 9781837632879 1837632871 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 audio file (11 hr., 43 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Wilhoit, Kyle VerfasserIn aut Operationalizing threat intelligence Kyle Wilhoit, Joseph Opacki [First edition]. [Place of publication not identified] Packt Publishing 2022 1 Online-Ressource (1 audio file (11 hr., 43 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 31, 2023) Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence program About This Audiobook Develop and implement a threat intelligence program from scratch Discover techniques to perform cyber threat intelligence, collection, and analysis using open-source tools Leverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programs In Detail We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps. In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence. By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production. Audience This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book. Computer security Sécurité informatique Audiobooks Livres audio Opacki, Joseph VerfasserIn aut |
spellingShingle | Wilhoit, Kyle Opacki, Joseph Operationalizing threat intelligence Computer security Sécurité informatique Audiobooks Livres audio |
title | Operationalizing threat intelligence |
title_auth | Operationalizing threat intelligence |
title_exact_search | Operationalizing threat intelligence |
title_full | Operationalizing threat intelligence Kyle Wilhoit, Joseph Opacki |
title_fullStr | Operationalizing threat intelligence Kyle Wilhoit, Joseph Opacki |
title_full_unstemmed | Operationalizing threat intelligence Kyle Wilhoit, Joseph Opacki |
title_short | Operationalizing threat intelligence |
title_sort | operationalizing threat intelligence |
topic | Computer security Sécurité informatique Audiobooks Livres audio |
topic_facet | Computer security Sécurité informatique Audiobooks Livres audio |
work_keys_str_mv | AT wilhoitkyle operationalizingthreatintelligence AT opackijoseph operationalizingthreatintelligence |