|Listed in category:
Have one to sell?

The Cyber Intelligence Handbook:: An Authoritative Guide for the C

US $7.54
ApproximatelyS$ 9.67
Condition:
Good
Breathe easy. Returns accepted.
Giving never felt so good. This sale benefits charity.
Shipping:
US $3.99 (approx S$ 5.12) Economy Shipping.
Located in: Tucson, Arizona, United States
Delivery:
Estimated between Wed, 3 Sep and Mon, 8 Sep
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
14 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:156618974658
Last updated on Feb 17, 2025 04:34:01 SGTView all revisionsView all revisions

All net proceeds will support Goodwill Industries of Southern Arizona, Inc

Goodwill of Southern Arizona's mission is to provide jobs and training for people to gain skills and achieve independence. The sale of generously donated goods helps support 6 adult programs, 6 youth ...
  • Official eBay for Charity listing. Learn more
  • This sale benefits a verified non-profit partner.

Item specifics

Condition
Good: A book that has been read but is in good condition. Very minimal damage to the cover including ...
ISBN
9781082404382

About this product

Product Identifiers

Publisher
Independently Published
ISBN-10
1082404381
ISBN-13
9781082404382
eBay Product ID (ePID)
13038814714

Product Key Features

Number of Pages
394 Pages
Language
English
Publication Name
Cyber Intelligence Handbook : : an Authoritative Guide for the C-Suite, IT Staff, and Intelligence Team
Subject
Reference
Publication Year
2019
Type
Textbook
Author
David M. Cooney Jr
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.8 in
Item Weight
18.6 Oz
Item Length
9 in
Item Width
6 in

Additional Product Features

Intended Audience
Trade
TitleLeading
The
Synopsis
Seize the initiative from cyber-threat actors by applying cyber intelligence to create threat-driven cybersecurity operations Written by an intelligence professional with 40 years of experience applying intelligence to counter threats from a wide range of determined adversaries, this book provides common sense practices for establishing and growing responsive cyber intelligence capabilities customized to organization needs, regardless of size or industry. Readers will learn: -What cyber intelligence is and how to apply it to deter, detect, and defeat malicious cyber-threat actors targeting your networks and data;-How to characterize threats and threat actors with precision to enable all relevant stakeholders to contribute to desired security outcomes;-A three-step planning approach that allows cyber intelligence customers to define and prioritize their needs;-How to construct a simplified cyber intelligence process that distills decades of national-level intelligence community doctrine into a sets of clearly defined, mutually supporting actions that will produce repeatable and measureable results from the outset;-How to employ advanced analytic frameworks to apply intelligence as an operational function that can inform security design and execution to complicate actions for would be attackers., Seize the initiative from cyber-threat actors by applying cyber intelligence to create threat-driven cybersecurity operations! Written by an intelligence professional with 40 years of experience applying intelligence to counter threats from a wide range of determined adversaries, this book provides common sense practices for establishing and growing responsive cyber intelligence capabilities customized to organization needs, regardless of size or industry. Readers will learn: -What cyber intelligence is and how to apply it to deter, detect, and defeat malicious cyber-threat actors targeting your networks and data;-How to characterize threats and threat actors with precision to enable all relevant stakeholders to contribute to desired security outcomes;-A three-step planning approach that allows cyber intelligence customers to define and prioritize their needs;-How to construct a simplified cyber intelligence process that distills decades of national-level intelligence community doctrine into a sets of clearly defined, mutually supporting actions that will produce repeatable and measureable results from the outset;-How to employ advanced analytic frameworks to apply intelligence as an operational function that can inform security design and execution to complicate actions for would be attackers.

Item description from the seller

About this seller

Goodwill Southern AZ

96.8% positive feedback130K items sold

Joined Sep 2015
Goodwill® Industries of Southern Arizona’s mission is to provide jobs and training for people to gain skills and achieve independence. We believe in the POWER OF WORK – that a job enhances the dignity ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
4.8
Shipping speed
5.0
Communication
5.0

Seller feedback (36,408)

All ratings
Positive
Neutral
Negative