|
|
|
|
LEADER |
01370pam a22003611i 4500 |
001 |
180-020582031 |
003 |
Uk |
005 |
20220623021241.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
220429s2022 enk o 000|0|eng|d |
015 |
|
|
|a GBC284285
|2 bnb
|
020 |
|
|
|a 9781801818667 (ebook) :
|c £26.99
|
020 |
|
|
|z 9781801814683 (pbk.) :
|c £33.99
|
037 |
|
|
|a 9781801818667
|b Packt Publishing Pvt. Ltd
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Wilhoit, Kyle
|e author.
|1 https://isni.org/isni/0000000501687104
|
245 |
1 |
0 |
|a Operationalizing threat intelligence
|b a guide to developing and operationalizing cyber threat intelligence programs
|c Kyle Wilhoit, Joseph Opacki
|
264 |
|
1 |
|a Birmingham
|b Packt Publishing
|c 2022
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
650 |
|
0 |
|a Computer security.
|
700 |
1 |
|
|a Opacki, Joseph
|e author.
|
776 |
0 |
8 |
|i Print version :
|z 9781801814683
|
884 |
|
|
|a LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl
|g 20220515
|k 9781801818667
|q Uk
|
859 |
|
|
|a ELD
|b ebook
|
916 |
|
|
|a 700=NEW
|
980 |
|
|
|a 020582031
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756560665706496 |
access_facet |
Electronic Resources |
author |
Wilhoit, Kyle, Opacki, Joseph |
author_facet |
Wilhoit, Kyle, Opacki, Joseph |
author_role |
aut, aut |
author_sort |
Wilhoit, Kyle |
author_variant |
k w kw, j o jo |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-020582031 |
illustrated |
Not Illustrated |
imprint |
Birmingham, Packt Publishing, 2022 |
imprint_str_mv |
Birmingham Packt Publishing 2022 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781801818667 (ebook) : |
isbn_isn_mv |
9781801814683 (pbk.) :, 9781801814683 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:06.896Z |
match_str |
wilhoit2022operationalizingthreatintelligenceaguidetodevelopingandoperationalizingcyberthreatintelligenceprograms |
mega_collection |
British National Bibliography |
physical |
1 online resource |
publishDate |
2022 |
publishDateSort |
2022 |
publishPlace |
Birmingham |
publisher |
Packt Publishing |
record_format |
marcfinc |
record_id |
020582031 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
180 |
spelling |
Wilhoit, Kyle author. https://isni.org/isni/0000000501687104, Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki, Birmingham Packt Publishing 2022, 1 online resource., text rdacontent, computer rdamedia, online resource rdacarrier, Description based on CIP data; resource not viewed., Computer security., Opacki, Joseph author., Print version : 9781801814683, LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl 20220515 9781801818667 Uk, ELD ebook |
spellingShingle |
Wilhoit, Kyle, Opacki, Joseph, Operationalizing threat intelligence: a guide to developing and operationalizing cyber threat intelligence programs, Computer security. |
title |
Operationalizing threat intelligence: a guide to developing and operationalizing cyber threat intelligence programs |
title_auth |
Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs |
title_full |
Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki |
title_fullStr |
Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki |
title_full_unstemmed |
Operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki |
title_short |
Operationalizing threat intelligence |
title_sort |
operationalizing threat intelligence a guide to developing and operationalizing cyber threat intelligence programs |
title_sub |
a guide to developing and operationalizing cyber threat intelligence programs |
topic |
Computer security. |
topic_facet |
Computer security. |