skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Cyber Threat Intelligence Preview this item
ClosePreview this item
Checking...

Cyber Threat Intelligence

Author: Ali Dehghantanha; Mauro Conti; Tooska Dargahi
Publisher: Cham : Springer International Publishing, 2018
Series: Advances in Information Security, 70
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Erscheint auch als:
Druck-Ausgabe
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ali Dehghantanha; Mauro Conti; Tooska Dargahi
ISBN: 9783319739519 3319739514
OCLC Number: 1035451425
Description: 1 Online-Ressource (VI, 334 Seiten 105 Illustrationen, 77 Illustrationen in color)
Series Title: Advances in Information Security, 70
Responsibility: edited by Ali Dehghantanha, Mauro Conti, Tooska Dargahi.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1035451425<\/a>> # Cyber Threat Intelligence<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:MediaObject<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1035451425<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/kunstliche_intelligenz<\/a>> ; # K\u00FCnstliche Intelligenz<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computers<\/a>> ; # Computers<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_science<\/a>> ; # Computer Science<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/artificial_intelligence_incl_robotics<\/a>> ; # Artificial Intelligence (incl. Robotics)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_communication_networks<\/a>> ; # Computer Communication Networks<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/artificial_intelligence<\/a>> ; # Artificial intelligence<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/security<\/a>> ; # Security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_communication_systems<\/a>> ; # Computer communication systems<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/gefahrenabwehr<\/a>> ; # Gefahrenabwehr<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/information_systems_and_communication_service<\/a>> ; # Information Systems and Communication Service<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/cyberattacke<\/a>> ; # Cyberattacke<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/dehghantanha_ali<\/a>> ; # Ali Dehghantanha<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/dargahi_tooska<\/a>> ; # Tooska Dargahi<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/conti_mauro<\/a>> ; # Mauro Conti<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4667595849<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/1568-2633<\/a>> ; # Advances in Information Security ;<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/4667595849#CreativeWork\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyber Threat Intelligence<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1035451425<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-319-73951-9<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/dx.doi.org\/10.1007\/978-3-319-73951-9<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319739519<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1035451425<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dx.doi.org\/10.1007\/978-3-319-73951-9<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:IndividualProduct<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/conti_mauro<\/a>> # Mauro Conti<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Conti<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Mauro<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mauro Conti<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/dargahi_tooska<\/a>> # Tooska Dargahi<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Dargahi<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Tooska<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Tooska Dargahi<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Person\/dehghantanha_ali<\/a>> # Ali Dehghantanha<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Dehghantanha<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Ali<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Ali Dehghantanha<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/artificial_intelligence<\/a>> # Artificial intelligence<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Artificial intelligence<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/artificial_intelligence_incl_robotics<\/a>> # Artificial Intelligence (incl. Robotics)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Artificial Intelligence (incl. Robotics)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_communication_networks<\/a>> # Computer Communication Networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer Communication Networks<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_communication_systems<\/a>> # Computer communication systems<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer communication systems<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computer_science<\/a>> # Computer Science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer Science<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer science<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/computers<\/a>> # Computers<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computers<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/cyberattacke<\/a>> # Cyberattacke<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberattacke<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/gefahrenabwehr<\/a>> # Gefahrenabwehr<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Gefahrenabwehr<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/information_systems_and_communication_service<\/a>> # Information Systems and Communication Service<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information Systems and Communication Service<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/kunstliche_intelligenz<\/a>> # K\u00FCnstliche Intelligenz<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"K\u00FCnstliche Intelligenz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4667595849#Topic\/security<\/a>> # Security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/4667595849#CreativeWork\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Erscheint auch als:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1035451425<\/a>> ; # Cyber Threat Intelligence<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319739519<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319739514<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319739519<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/1568-2633<\/a>> # Advances in Information Security ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1035451425<\/a>> ; # Cyber Threat Intelligence<\/span>\n\u00A0\u00A0\u00A0\nschema:issn<\/a> \"1568-2633<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Advances in Information Security ;<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n