How to define and build an effective cyber threat intelligence capability / / Henry Dalziel.

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Waltham, Massachusetts : : Syngress,, 2015.
2015
Year of Publication:2015
Language:English
Online Access:
Physical Description:1 online resource (43 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001888755
ctrlnum (MiAaPQ)5001888755
(Au-PeEL)EBL1888755
(CaPaEBR)ebr10999731
(CaONFJC)MIL679363
(OCoLC)898422494
collection bib_alma
record_format marc
spelling Dalziel, Henry, author.
How to define and build an effective cyber threat intelligence capability / Henry Dalziel.
Waltham, Massachusetts : Syngress, 2015.
2015
1 online resource (43 pages)
text rdacontent
computer rdamedia
online resource rdacarrier
Description based on online resource; title from PDF title page (ebrary, viewed January 10, 2015).
Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer networks Security measures.
Electronic books.
Print version: Dalziel, Henry. How to define and build an effective cyber threat intelligence capability. Waltham, Massachusetts : Syngress, c2015 32 pages 9780128027301
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1888755 Click to View
language English
format eBook
author Dalziel, Henry,
spellingShingle Dalziel, Henry,
How to define and build an effective cyber threat intelligence capability /
author_facet Dalziel, Henry,
author_variant h d hd
author_role VerfasserIn
author_sort Dalziel, Henry,
title How to define and build an effective cyber threat intelligence capability /
title_full How to define and build an effective cyber threat intelligence capability / Henry Dalziel.
title_fullStr How to define and build an effective cyber threat intelligence capability / Henry Dalziel.
title_full_unstemmed How to define and build an effective cyber threat intelligence capability / Henry Dalziel.
title_auth How to define and build an effective cyber threat intelligence capability /
title_new How to define and build an effective cyber threat intelligence capability /
title_sort how to define and build an effective cyber threat intelligence capability /
publisher Syngress,
publishDate 2015
physical 1 online resource (43 pages)
isbn 9780128027523
9780128027301
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 D359 42015
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1888755
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 898422494
work_keys_str_mv AT dalzielhenry howtodefineandbuildaneffectivecyberthreatintelligencecapability
status_str n
ids_txt_mv (MiAaPQ)5001888755
(Au-PeEL)EBL1888755
(CaPaEBR)ebr10999731
(CaONFJC)MIL679363
(OCoLC)898422494
is_hierarchy_title How to define and build an effective cyber threat intelligence capability /
_version_ 1792330803570540545
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01656nam a2200397 i 4500</leader><controlfield tag="001">5001888755</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">150110t20152015mau o 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780128027301</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128027523</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001888755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1888755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10999731</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL679363</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)898422494</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.D359 2015</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dalziel, Henry,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to define and build an effective cyber threat intelligence capability /</subfield><subfield code="c">Henry Dalziel.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (43 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed January 10, 2015).</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Dalziel, Henry.</subfield><subfield code="t">How to define and build an effective cyber threat intelligence capability.</subfield><subfield code="d">Waltham, Massachusetts : Syngress, c2015 </subfield><subfield code="h">32 pages </subfield><subfield code="z">9780128027301</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1888755</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>