commit
f2637998ed
|
@ -427,6 +427,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||
A framework for cybersecurity information sharing and risk reduction. A high level overview paper by Microsoft.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511" target="_blank">Structured Analytic Techniques For Intelligence Analysis</a>
|
||||
</td>
|
||||
<td>
|
||||
This book contains methods that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
||||
|
|
Loading…
Reference in New Issue