You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
5 months ago | |
---|---|---|
best-practices | 5 months ago | |
README.md | 4 years ago | |
book.adoc | 5 months ago | |
book.html | 5 months ago | |
book.pdf | 5 months ago | |
build.sh | 5 months ago |
README.md
Best Practices in Threat Intelligence
The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.
The book is available in PDF and HTML format.
How To Contribute
- Fork the project
- Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
- Make a pull-request
License
The book is licensed under the AGPL version 3.