Asia Pacific University Library catalogue


Security operations center : building, operating, and maintaining your SOC / Joseph Muniz, Gary McIntyre, Nadhem AlFardan.

By: Muniz, JosephContributor(s): McIntyre, Gary | AlFardan, NadhemMaterial type: TextTextPublication details: Indianapolis, Indiana : Cisco Press, [2016]Description: xxi, 424 p. : ill. ; 24 cmISBN: 0134052013 (pbk.); 9780134052014 (pbk.)Other title: Building, operating, and maintaining your SOCSubject(s): Cyberinfrastructure -- Security measures | Cyberterrorism -- Prevention | Computer networks -- Security measuresDDC classification: 005.8 LOC classification: QA76.9.A25 | M88 2016
Contents:
Introduction to security operations and the SOC -- Overview of SOC technologies -- Assessing security operations capabilities -- SOC strategy -- The SOC infrastructure -- Security event generation and collection -- Vulnerability management -- People and processes -- The technology -- Preparing to operate -- Reacting to events and incidents -- Maintain, review, and improve.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
Staff Circulation Staff Circulation APU Library
Open Shelf
Book QA76.9.A25 M88 2016 c.1 (Browse shelf (Opens below)) 1 Missing 00012141
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 M88 2016 c.2 (Browse shelf (Opens below)) 2 Available 00012267
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 M6735 2022 c.1 Advanced cybersecurity technologies / QA76.9.A25 M86 2018 c.1 Investigating the cyber breach : QA76.9.A25 M88 2016 c.1 Security operations center : QA76.9.A25 M88 2016 c.2 Security operations center : QA76.9.A25 N45 2010 c.1 Guide to computer forensics and investigations / QA76.9.A25 N45 2010 c.2 Guide to computer forensics and investigations / QA76.9.A25 N45 2016 c.1 Guide to computer forensics and investigations /

Includes index.

Introduction to security operations and the SOC -- Overview of SOC technologies -- Assessing security operations capabilities -- SOC strategy -- The SOC infrastructure -- Security event generation and collection -- Vulnerability management -- People and processes -- The technology -- Preparing to operate -- Reacting to events and incidents -- Maintain, review, and improve.

There are no comments on this title.

to post a comment.