Asia Pacific University Library catalogue


Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence / (Record no. 383244)

000 -LEADER
fixed length control field 02560nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field APU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200928053219.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200928b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781986862011 (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1986862011 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency APU
Language of cataloging eng
Transcribing agency APU
Modifying agency SF
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number T46 2018
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Thomas, Arun E.
9 (RLIN) 41269
245 10 - TITLE STATEMENT
Title Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence /
Statement of responsibility, etc Arun E. Thomas.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc [S.l.] :
Name of publisher, distributor, etc CreateSpace Independent Publishing Platform,
Date of publication, distribution, etc c2018.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 376 pages :
Dimensions 23 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments. The term “Cyber Threat Intelligence” has gained considerable interest in the Information Security community over the past few years. The main purpose of implementing a Cyber threat intelligence(CTI) program is to prepare businesses to gain awareness of cyber threats and implement adequate defenses before disaster strikes. Threat Intelligence is the knowledge that helps Enterprises make informed decisions about defending against current and future security threats. This book is a complete practical guide to understanding, planning and building an effective Cyber Threat Intelligence program within an organization. This book is a must read for any Security or IT professional with mid to advanced level of skills. The book provides insights that can be leveraged on in conversations with your management and decision makers to get your organization on the path to building an effective CTI program.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 41327
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
9 (RLIN) 41328
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information warfare.
9 (RLIN) 41329
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Invoice number Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Copy number Cost, replacement price Price effective from Koha item type PO number
Not Withdrawn Available   Not Damaged Available for loan Book APU Library APU Library Open Shelf 28/09/2020 IBS Buku 120412 253.70 4 4 QA76.9.A25 T46 2018 c.1 00012836 09/11/2023 23/10/2023 1 253.70 24/08/2020 General Circulation U-2020/08/1022