Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions最新文献

筛选
英文 中文
Functional Capabilities of the CI ‐ DR TM Program CI‐DR TM程序的功能能力
{"title":"Functional Capabilities of the\u0000 CI\u0000 ‐\u0000 \u0000 DR\u0000 TM\u0000 \u0000 Program","authors":"","doi":"10.1002/9781119676942.ch5","DOIUrl":"https://doi.org/10.1002/9781119676942.ch5","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CI ‐ DR ™ Collection Components CI‐DR™收集组件
{"title":"CI\u0000 ‐\u0000 DR\u0000 ™ Collection Components","authors":"","doi":"10.1002/9781119676942.ch11","DOIUrl":"https://doi.org/10.1002/9781119676942.ch11","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122205971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military to Commercial Viability of the CI ‐ DR ™ Program CI - DR™计划的军事到商业可行性
{"title":"Military to Commercial Viability of the\u0000 CI\u0000 ‐\u0000 DR\u0000 ™ Program","authors":"","doi":"10.1002/9781119676942.ch3","DOIUrl":"https://doi.org/10.1002/9781119676942.ch3","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"17 34","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
{"title":"Conclusion","authors":"","doi":"10.1002/9781119676942.oth","DOIUrl":"https://doi.org/10.1002/9781119676942.oth","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CI ‐ DR ™ Key Capability Cyber Threat Intelligence CI - DR™关键能力网络威胁情报
{"title":"CI\u0000 ‐\u0000 DR\u0000 ™ Key Capability Cyber Threat Intelligence","authors":"","doi":"10.1002/9781119676942.ch7","DOIUrl":"https://doi.org/10.1002/9781119676942.ch7","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Glossary 术语表
{"title":"Glossary","authors":"","doi":"10.1002/9781119676942.gloss","DOIUrl":"https://doi.org/10.1002/9781119676942.gloss","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128277406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CI ‐ DR ™ Key Capability Next‐Generation Security Operations Center CI - DR™关键功能下一代安全运营中心
{"title":"CI\u0000 ‐\u0000 DR\u0000 ™ Key Capability Next‐Generation Security Operations Center","authors":"","doi":"10.1002/9781119676942.ch6","DOIUrl":"https://doi.org/10.1002/9781119676942.ch6","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Index 指数
{"title":"Index","authors":"","doi":"10.1002/9781119676942.index","DOIUrl":"https://doi.org/10.1002/9781119676942.index","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Objectives of a Cyber Intelligence‐Driven Risk Program 网络情报驱动风险计划的目标
{"title":"Objectives of a Cyber Intelligence‐Driven Risk Program","authors":"","doi":"10.1002/9781119676942.ch1","DOIUrl":"https://doi.org/10.1002/9781119676942.ch1","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132927144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Importance of Cyber Intelligence for Businesses 网络智能对企业的重要性
{"title":"Importance of Cyber Intelligence for Businesses","authors":"","doi":"10.1002/9781119676942.ch2","DOIUrl":"https://doi.org/10.1002/9781119676942.ch2","url":null,"abstract":"","PeriodicalId":275048,"journal":{"name":"Cyber Intelligence‐Driven Risk ‐ How to Build and Use Cyber Intelligence for Business Risk Decisions","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信