Cyber Threat Intelligence
ISBN 978-1-4932-2813-3 600 pages, 2026
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2814-0 600 pages, 2026, Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2815-7
- Understand the cyber intelligence lifecycle and get to know your sources: OSINT, HUMINT, and SIGINT
- Develop threat models and conduct forensic analysis of network data and host systems to detect malicious behavior
- Integrate CTI into incident response, explore threat hunting, and see how automation can improve your CTI workflows
In this book, you’ll learn about:
-
Frameworks and Fundamentals
Learn what cyber threat intelligence is and how it works in the real world. Understand the full intelligence lifecycle, from planning to feedback, and the different sources of intelligence, from OSINT to SIGINT.
-
Threat Modeling, Analysis, and Response
Master CTI tools and techniques. Apply the MITRE ATT&CK framework to model threats, turn network and host data into actionable intelligence, design custom threat detection logic, implement automation with MISP and OpenCTI, and more.
-
Best Practices and Case Studies
Explore real-world workflows and practical examples. See how intelligence supports incident response, threat hunting, and automation, and learn proven methods for handling feed quality, enrichment, and operational integration.
Highlights include:
-
Cyber intelligence lifecycle
-
Open-source intelligence (OSINT)
-
Human intelligence (HUMINT)
-
Signals intelligence (SIGINT)
-
Intelligence gathering
-
Adversary profiling
-
Threat intelligence feed integrity
-
Network forensics
-
Host-based forensics
-
Incident response
-
Threat hunting
-
Automation
You may also like:
-
Digital Payments with SAP –
Credit Card Processing, PSP Integration, and PCI Compliance400 pages, hardcover
Implement the SAP digital payments add-on to standardize your payment operations and ensure PCI compliance! Start by setting up the add-on in SAP BTP and then integrate it with your payment service providers (PSPs). Get step-by-step implementation and configuration instructions, … More about the bookapprox. $94.99
Pre-order now
Available on 06/25/2026E-book | Print edition | Bundle -
Ethical Hacking –
The Practical Guide for Pentesting and Red Teaming850 pages, paperback
Is your IT system truly secure? There’s only one way to find out: learn to think like a hacker and test it yourself! You’ll start by understanding how to find vulnerabilities through techniques like footprinting, scanning, enumeration, and fuzzing. Then … More about the bookapprox. $54.99
Pre-order now
Available on 05/27/2026E-book | Print edition | Bundle -
Advanced Valuation with SAP S/4HANA Finance
110 pages
Calibrate your local and functional currencies before period-end close with advanced valuation! Get step-by-step instructions for essential configuration settings, from aging increments to account mapping in SAP S/4HANA. Then run through the advanced valuation process: long-term asset and liability discounting, … More about the bookapprox. $34.99
Pre-order now
Available on 05/20/2026E-Bite


