'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.' Steffen Wendzel, Computing Reviews
1. Introduction; 2. Moving to proactive cyber threat intelligence; 3. Understanding darkweb malicious hacker forums; 4. Automatic mining of cyber intelligence from the dark web; 5. Analyzing products and vendors in malicious hacking markets; 6. Using game theory for threat intelligence; 7. Application – protecting industrial control systems; 8. Conclusion – the future of darkweb cyber threat intelligence.