You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
||5 months ago|
|best-practices||5 months ago|
|README.md||4 years ago|
|book.adoc||5 months ago|
|book.html||5 months ago|
|book.pdf||5 months ago|
|build.sh||5 months ago|
Best Practices in Threat Intelligence
The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.
The book is available in PDF and HTML format.
How To Contribute
- Fork the project
- Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
- Make a pull-request
The book is licensed under the AGPL version 3.