|Alexandre Dulaunoy 9e9a9fa416
Best Practices in Threat Intelligence
The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.
How To Contribute
- Fork the project
- Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
- Make a pull-request
The book is licensed under the AGPL version 3.