Collect, process, and analyze cyber threats to secure your system!

Cyber Threat Intelligence

written by
approx. $74.99

Pre-order now

approx. $79.95

Pre-order now

approx. $89.99

Pre-order now

Print edition E-book Bundle
600 pages, , Print edition paperback
ISBN 978-1-4932-2813-3
600 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2814-0
600 pages, , Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2815-7
A strong cybersecurity program needs to stay informed. With this all-in-one guide, master both the theory and practice of cyber threat intelligence (CTI). Walk through the intelligence lifecycle, and then get up to speed on the latest tools and technologies for intelligence gathering, adversary profiling, network and host-based forensics, threat hunting, and more. Follow practical examples that showcase key CTI strategies in modern security operations.
  • Understand the cyber intelligence lifecycle and get to know your sources: OSINT, HUMINT, and SIGINT
  • Develop threat models and conduct forensic analysis of network data and host systems to detect malicious behavior
  • Integrate CTI into incident response, explore threat hunting, and see how automation can improve your CTI workflows
About the E-book About the Book E-book in full color. PDF and EPUB files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application. 600 pages, paperback. Reference book format 7 x 10 in. Printed black and white on 50# offset paper from sustainable sources. Casebound for durability. Reader-friendly serif font. One-column layout.

In this book, you’ll learn about:

  1. Frameworks and Fundamentals

    Learn what cyber threat intelligence is and how it works in the real world. Understand the full intelligence lifecycle, from planning to feedback, and the different sources of intelligence, from OSINT to SIGINT.

  2. Threat Modeling, Analysis, and Response

    Master CTI tools and techniques. Apply the MITRE ATT&CK framework to model threats, turn network and host data into actionable intelligence, design custom threat detection logic, implement automation with MISP and OpenCTI, and more.

  3. Best Practices and Case Studies

    Explore real-world workflows and practical examples. See how intelligence supports incident response, threat hunting, and automation, and learn proven methods for handling feed quality, enrichment, and operational integration.

Highlights include:

  • Cyber intelligence lifecycle
  • Open-source intelligence (OSINT)
  • Human intelligence (HUMINT)
  • Signals intelligence (SIGINT)
  • Intelligence gathering
  • Adversary profiling
  • Threat intelligence feed integrity
  • Network forensics
  • Host-based forensics
  • Incident response
  • Threat hunting
  • Automation

Haydar Yener Arıcı is a senior systems and cybersecurity specialist with more than 23 years of experience in IT infrastructure, system administration, digital forensics, and open-source intelligence (OSINT). Throughout his career, he has conducted extensive work in critical areas such as the design, operation, and security of enterprise IT infrastructures; digital evidence analysis; and the establishment and development of corporate cybersecurity processes.

Haydar holds one bachelor’s degree and three master’s degrees, combining his academic background with extensive field experience to develop projects at both technical and strategic levels.

more >

You may also like:

  • Cover of Digital Payments with SAP

    Digital Payments with SAP
    Credit Card Processing, PSP Integration, and PCI Compliance

    Saravana Kumar Kuppusamy

    400 pages, hardcover

    Implement the SAP digital payments add-on to standardize your payment operations and ensure PCI compliance! Start by setting up the add-on in SAP BTP and then integrate it with your payment service providers (PSPs). Get step-by-step implementation and configuration instructions, More about the book

    approx. $94.99

    Pre-order now
    Available on 06/25/2026

    E-book | Print edition | Bundle
  • Cover of Ethical Hacking

    Ethical Hacking
    The Practical Guide for Pentesting and Red Teaming

    Florian Dalwigk

    850 pages, paperback

    Is your IT system truly secure? There’s only one way to find out: learn to think like a hacker and test it yourself! You’ll start by understanding how to find vulnerabilities through techniques like footprinting, scanning, enumeration, and fuzzing. Then More about the book

    approx. $54.99

    Pre-order now
    Available on 05/27/2026

    E-book | Print edition | Bundle
  • Cover of Advanced Valuation with SAP S/4HANA Finance

    Advanced Valuation with SAP S/4HANA Finance

    Sudhakar Kovuri, Neelima Singh

    110 pages

    Calibrate your local and functional currencies before period-end close with advanced valuation! Get step-by-step instructions for essential configuration settings, from aging increments to account mapping in SAP S/4HANA. Then run through the advanced valuation process: long-term asset and liability discounting, More about the book

    approx. $34.99

    Pre-order now
    Available on 05/20/2026

    E-Bite