free tracker


Building An Intelligence Led Security Program

Pub Date : 2014-12-10 | Author : Allan Liska | Publisher : Syngress

ISBN 10 : 9780128023709
ISBN 13 : 0128023708

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attacker..


Effective Threat Intelligence

Pub Date : 2016-06-23 | Author : James Dietle | Publisher :

ISBN 10 : 1533314551
ISBN 13 : 9781533314550

You already have the tools to make a threat intel program! With the growing number of threats against companies, threat intelligence is becoming a business essential. This book wil..


Darkweb Cyber Threat Intelligence Mining

Pub Date : 2017-03-31 | Author : John Robertson | Publisher : Cambridge University Press

ISBN 10 : 9781107185777
ISBN 13 : 1107185777

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adv..


The Cyber Risk Handbook

Pub Date : 2017-04-03 | Author : Domenic Antonucci | Publisher : John Wiley & Sons

ISBN 10 : 9781119308959
ISBN 13 : 111930895X

Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyb..


Security Operations Center

Pub Date : 2015-11-02 | Author : Joseph Muniz | Publisher : Cisco Press

ISBN 10 : 9780134052038
ISBN 13 : 013405203X

Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations Center ..