Zum Hauptinhalt springen

Noch bis Mittwoch: 20 % auf E-Books und Events zum Thema KI sparen >

Collect, process, and analyze cyber threats to secure your system!

Cyber Threat Intelligence

ca. € 79,95

Vorbestellbar
Lieferbar ab 07.09.2026

ca. € 79,95

Vorbestellbar
Verfügbar ab 07.09.2026

600 Seiten, , broschiert
Rheinwerk Computing, ISBN 978-1-4932-2813-3
600 Seiten,
E-Book-Formate: PDF, EPUB, Online
Rheinwerk Computing, ISBN 978-1-4932-2814-0

A strong cybersecurity program needs to stay informed. With this all-in-one guide, master both the theory and practice of cyber threat intelligence (CTI). Walk through the intelligence lifecycle, and then get up to speed on the latest tools and technologies for intelligence gathering, adversary profiling, network and host-based forensics, threat hunting, and more. Follow practical examples that showcase key CTI strategies in modern security operations.

  • Understand the cyber intelligence lifecycle and get to know your sources: OSINT, HUMINT, and SIGINT
  • Develop threat models and conduct forensic analysis of network data and host systems to detect malicious behavior
  • Integrate CTI into incident response, explore threat hunting, and see how automation can improve your CTI workflows
600 pages, paperback. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font. One-column layout.
E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application.

In this book, you’ll learn about:

  1. Frameworks and Fundamentals

    Learn what cyber threat intelligence is and how it works in the real world. Understand the full intelligence lifecycle, from planning to feedback, and the different sources of intelligence, from OSINT to SIGINT.

  2. Threat Modeling, Analysis, and Response

    Master CTI tools and techniques. Apply the MITRE ATT&CK framework to model threats, turn network and host data into actionable intelligence, design custom threat detection logic, implement automation with MISP and OpenCTI, and more.

  3. Best Practices and Case Studies

    Explore real-world workflows and practical examples. See how intelligence supports incident response, threat hunting, and automation, and learn proven methods for handling feed quality, enrichment, and operational integration.

Highlights include:

  • Cyber intelligence lifecycle
  • Open-source intelligence (OSINT)
  • Human intelligence (HUMINT)
  • Signals intelligence (SIGINT)
  • Intelligence gathering
  • Adversary profiling
  • Threat intelligence feed integrity
  • Network forensics
  • Host-based forensics
  • Incident response
  • Threat hunting
  • Automation
Haydar Yener Arici is a senior system and digital forensic specialization with more than 23 years of professional experience in IT infrastructure, system administration, digital forensics, and open-source intelligence (OSINT). He is the author several publications in Turkey, including books about Windows Server administration, enterprise IT security, and digital evidence handling.
Autorenporträt
Buch

ca. € 79,95 inkl. MwSt.

Vorbestellbar
Lieferbar ab 07.09.2026

Kostenloser Versand nach Deutschland, Österreich und in die Schweiz

DSAG Mitglieder
Der Rabatt wird im Warenkorb sichtbar

E-Book

ca. € 79,95 inkl. MwSt.

Vorbestellbar
Verfügbar ab 07.09.2026

DSAG Mitglieder
Der Rabatt wird im Warenkorb sichtbar

Kostenloser Versand
nach Deutschland, Österreich und in die Schweiz
Bequem zahlen
Kreditkarte, Rechnung oder Bankeinzug
Schnelle Lieferung
Auch per Express