Security operations center : analyst guide : SIEM technology use cases and practices / Arun E. Thomas
Material type: Text[North Charleston, SC] : Arun E Thomas, c2017Description: 206 pages : illustration ; 23 cmISBN: 9781641365130 (pbk.); 1641365137 (pbk.)Subject(s): Computer networks -- Security measures | Computers -- Access controlLOC classification: TK5105.59 | .T46 2017Summary: Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this. A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deploymentsItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | TK5105.59 .T46 2017 c.1 (Browse shelf (Opens below)) | 1 | Available | 00012818 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
TK5105.59 .S73 2017 c.1 Network security essentials : | TK5105.59 .S7585 2020 c.1 Network security, firewalls, and VPNs / | TK5105.59 .T46 2016 c.1 Security operations center : analyst guide : SIEM technology use cases and practices / | TK5105.59 .T46 2017 c.1 Security operations center : analyst guide : SIEM technology use cases and practices / | TK5105.59 .T76 2010 c.1 Practical intrusion analysis : | TK5105.59 .V46 2009 c.2 Security solutions for cyber-physical systems / | TK5105.59 .W33 2000 c.1 The process of network security : |
Title from cover.
"SIEM technology, use cases and practices - a must have for those working as and those who intend to work as SOC analyst"--Cover.
Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches. Security Analyst is the individual that is qualified to perform the functions necessary to accomplish the security monitoring goals of the organization. This book is intended to improve the ability of a security analyst to perform their day to day work functions in a more professional manner. Deeper knowledge of tools, processes and technology is needed for this.
A firm understanding of all the domains of this book is going to be vital in achieving the desired skill set to become a professional security analyst. The attempt of this book is to address the problems associated with the content development (use cases and correlation rules) of SIEM deployments
There are no comments on this title.