Go to file
Alexandre Dulaunoy dbc27c3b5f
chg: [clean-up] various updates and some refs to new features
2022-11-06 17:20:32 +01:00
best-practices chg: [clean-up] various updates and some refs to new features 2022-11-06 17:20:32 +01:00
README.md chg: [book] Various improvements in all sections. Some logical re-ordering in the main Book. 2019-02-15 17:47:35 +09:00
book.adoc forgot to add myself to authors list 2019-03-22 18:21:11 +01:00
book.html chg: [clean-up] various updates and some refs to new features 2022-11-06 17:20:32 +01:00
book.pdf chg: [clean-up] various updates and some refs to new features 2022-11-06 17:20:32 +01:00
build.sh chg: [clean-up] various updates and some refs to new features 2022-11-06 17:20:32 +01:00

README.md

Best Practices in Threat Intelligence

The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.

The book is available in PDF and HTML format.

How To Contribute

  1. Fork the project
  2. Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
  3. Make a pull-request

License

The book is licensed under the AGPL version 3.