Security Operations Center - Analyst Guide SIEM technology use cases and practices

Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches

Saved in:
Bibliographic Details
Main Author: Thomas, Arun E
Format: Book
Language:English
Published: North Charleston Arun E Thomas 2017
Edition:Print book : English
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000#i 4501
001 wils-976602
005 2022026171825
008 220620t2017 -US ag# ##001 ##eng#D
020 # # |a 9781641365130  |q paperback 
040 # # |a UiTM  |b eng  |c UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b T46 2017 
100 1 # |a Thomas, Arun E 
245 0 0 |a Security Operations Center - Analyst Guide  |b SIEM technology use cases and practices  |c Arun E. Thomas 
250 # # |a Print book : English 
264 # 1 |a North Charleston  |b Arun E Thomas  |c 2017 
264 # 4 |c ©2017 
300 # # |a 193 pages  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
500 # # |a Title from cover."SIEM technology, use cases and practices - a must have for those working as and those who intend to work as SOC analyst"--Cover 
520 # # |a Security analytics can be defined as the process of continuously monitoring and analyzing all the activities in your enterprise network to ensure the minimal number of occurrences of security breaches 
526 0 # |a Bachelor of Engineering (Hons) Electronics Engineering  |b Cybersecurity  |5 UiTM 
546 # # |a In English 
650 1 0 |a Computer networks  |x Security measures 
650 2 0 |a Computers  |x Access control 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=976602 
964 # # |c BOK  |d 01 
998 # # |a 00250##a006.2.2||00250##b006.2.2||00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00500##a006.2.2||01500##a006.2.2||00520##a006.2.2||00520##b006.2.2||00546##a006.2.2||