Asia Pacific University Library catalogue


Security operations center : analyst guide : SIEM technology use cases and practices / Arun E. Thomas

By: Thomas, Arun EMaterial type: TextText[North Charleston, SC] : Arun E Thomas, c2017Description: 206 pages : illustration ; 23 cmISBN: 9781641365130 (pbk.); 1641365137 (pbk.)Subject(s): Computer networks -- Security measures | Computers -- Access controlLOC classification: TK5105.59 | .T46 2017Summary: Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APU Library
Open Shelf
Book TK5105.59 .T46 2017 c.1 (Browse shelf (Opens below)) 1 Available 00012818

Title from cover.
"SIEM technology, use cases and practices - a must have for those working as and those who intend to work as SOC analyst"--Cover.

Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this.
A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments

There are no comments on this title.

to post a comment.