Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainl
Socially enhanced Services Computing deals with a novel and exciting new field at the intersection between Social Computing, Service-oriented Computing, Crowd Computing, and Cloud Computing. The prese