LEADER 00896nam0-2200313---450- 001 990009804920403321 005 20140102140848.0 010 $a978-981-4324-23-6 035 $a000980492 035 $aFED01000980492 035 $a(Aleph)000980492FED01 035 $a000980492 100 $a20140102d2011----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa---a---001yy 200 1 $aFundamentals of quantum information$fHiroyuki Sagawa, Nobuaki Yoshida 210 $aNew Jersey$cWorld Scientific$d2011 215 $axii,254 p.$cill.$d23 cm. 610 0 $aQuantum computing 700 1$aSagawa,$bHiroyuki$053901 701 1$aYoshida,$bNobuaki$0521718 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009804920403321 952 $a22D-013$bDIPFIS 142$fFI1 959 $aFI1 996 $aFundamentals of quantum information$9837432 997 $aUNINA LEADER 03316nam 2200601 450 001 9910808897303321 005 20200520144314.0 010 $a0-12-802730-4 010 $a0-12-802752-5 035 $a(CKB)2670000000585902 035 $a(EBL)1888755 035 $a(OCoLC)898422494 035 $a(SSID)ssj0001455375 035 $a(PQKBManifestationID)11792520 035 $a(PQKBTitleCode)TC0001455375 035 $a(PQKBWorkID)11391599 035 $a(PQKB)11633273 035 $a(Au-PeEL)EBL1888755 035 $a(CaPaEBR)ebr10999731 035 $a(CaONFJC)MIL679363 035 $a(CaSebORM)9780128027301 035 $a(MiAaPQ)EBC1888755 035 $a(EXLCZ)992670000000585902 100 $a20150110h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHow to define and build an effective cyber threat intelligence capability /$fHenry Dalziel 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (43 p.) 300 $aDescription based upon print version of record. 311 $a1-322-48081-8 327 $aCover; Title Page; Copyright Page; Table of contents; Author Biography; Contributing Editors' Biography; Chapter 1 - Introduction; Chapter 2 - A Problem Well-Defined is Half-Solved; 2.1 Data feeds vs. intelligence ; 2.2 Defining threat intelligence ; Chapter 3 - Defining Business Objectives or "Start with Why"; 3.1 When defining business objectives, language matters ; Chapter 4 - Common Objectives of a Threat Intelligence Program; 4.1 - Once you have your why...; Chapter 5 - Translating Objectives into Needs, or "Why Drives What" 327 $a5.1 Illustration: translating the objective into concrete intelligence needs Chapter 6 - How Technology Models Operationalize Threat Data; 6.1 - How- labor options or "how much do I do myself?" ; 6.2 - Implementation - the best laid plans ; Chapter 7 - Who: Given Why, What, and How, Now You Can Ask Where To Get It; 7.1 - Reporting and management communication ; 7.2 - Defining and articulating budget needs ; Chapter 8 - Conclusion and Recap 330 $a Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo 606 $aComputer networks$xSecurity measures 607 $aUnited States$2fast 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aDalziel$b Henry$01620482 702 $aOlson$b Eric 702 $aCarnall$b James 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910808897303321 996 $aHow to define and build an effective cyber threat intelligence capability$94037138 997 $aUNINA