Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence / (Record no. 383244)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02560nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | APU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200928053219.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200928b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781986862011 (paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1986862011 (paperback) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | APU |
Language of cataloging | eng |
Transcribing agency | APU |
Modifying agency | SF |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | T46 2018 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Thomas, Arun E. |
9 (RLIN) | 41269 |
245 10 - TITLE STATEMENT | |
Title | Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence / |
Statement of responsibility, etc | Arun E. Thomas. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | [S.l.] : |
Name of publisher, distributor, etc | CreateSpace Independent Publishing Platform, |
Date of publication, distribution, etc | c2018. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | ix, 376 pages : |
Dimensions | 23 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments. The term “Cyber Threat Intelligence” has gained considerable interest in the Information Security community over the past few years. The main purpose of implementing a Cyber threat intelligence(CTI) program is to prepare businesses to gain awareness of cyber threats and implement adequate defenses before disaster strikes. Threat Intelligence is the knowledge that helps Enterprises make informed decisions about defending against current and future security threats. This book is a complete practical guide to understanding, planning and building an effective Cyber Threat Intelligence program within an organization. This book is a must read for any Security or IT professional with mid to advanced level of skills. The book provides insights that can be leveraged on in conversations with your management and decision makers to get your organization on the path to building an effective CTI program. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
9 (RLIN) | 41327 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Security measures. |
9 (RLIN) | 41328 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information warfare. |
9 (RLIN) | 41329 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Invoice number | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Copy number | Cost, replacement price | Price effective from | Koha item type | PO number |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Not Withdrawn | Available | Not Damaged | Available for loan | Book | APU Library | APU Library | Open Shelf | 28/09/2020 | IBS Buku | 120412 | 253.70 | 4 | 4 | QA76.9.A25 T46 2018 c.1 | 00012836 | 09/11/2023 | 23/10/2023 | 1 | 253.70 | 24/08/2020 | General Circulation | U-2020/08/1022 |