Full description not available
I**K
Fantastic in depth like look into Threat Intelligence
Very detailed and informative for anyone looking at a possible career in CTI, or security teams who want to better understand intel's role.
B**Z
Valuable ideas that you can leverage for greater security.
For myself the one thing more than anything else the author has missed is that the center of network and system security is always what and where is the data, where are the crown jewels? Its not that its not encompassed in the pages but for myself I think this is the one thing in security and in this book and most others that needs to be in plain English so it doesn't get lost. My other little quibble is the book has more material cited than a college text book and even though this is the correct way to do things its a little overwhelming. The last two chapters seem to be more forced on to the book rather than integrated but still worth a look. Still pointing out different resources and what can be gained and how it can be integrated is extremely helpful. Recommended but do have a little patience with the style, the material itself is well worth while!Overall I would certainly buy this book again, and it presents a wide scope of useful information, and the authors overall depth and considerations are solid. This book belongs in the library of anyone concerned with such a subject and network intelligence.
M**E
Tie your defense together
Mr. Liska makes the case that the process of security, how you think about and then fashion and execute an effective defense, is more important than the specific technologies deployed. His guiding principle is that the intelligence lifecycle, from data collection through analysis through dissemination, forms the backbone of evaluating and implementing any of a number of individual defensive tools.The book offers a wealth of specific tools and processes, and most importantly, how a business can phase in the implementation. For that reason alone, I would recommend it, as we all know many business approach security at the extremes: either not caring at all or just trying to throw money at the problem.Overall, while I may not necessarily agree with every tactic, this book does a great job of detailing the current state of the art and how those technologies could fit into an overall plan. It is useful to anyone looking to setup a coherent security process.Disclaimer: I am a colleague of Allan’s though we have never worked for the same company.
A**I
Not with it
This book is exactly 32 pages. No, that's not a typo 32 pages. Taking into account the price, this was not worth it. You can find better information on the internet for free.
Trustpilot
1 day ago
2 months ago