Security information and event management (SIEM) implementation / (Record no. 2592)

MARC details
000 -LEADER
fixed length control field 02699cam a22003494a 4500
001 - CONTROL NUMBER
control field 16526454
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220527073725.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101101s2011 nyua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010043139
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB094792
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015623093
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071701099 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071701095 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn678923651
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- YDXCP
-- UKM
-- BTCTA
-- SINLB
-- CDX
-- RCE
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S4425 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Security information and event management (SIEM) implementation /
Statement of responsibility, etc. David R. Miller ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiv, 430 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.
520 ## - SUMMARY, ETC.
Summary, etc. "Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 8669
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control.
9 (RLIN) 8670
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application logging (Computer science)
9 (RLIN) 8671
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, David,
Dates associated with a name 1959 November 5-
9 (RLIN) 8672
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Non-fiction Tan Tao University Tan Tao University General Stacks 06/17/2014 Gift of the ASIA foundation 1 005.8 AS-2014-0029 12/16/2019 12/16/2019 06/17/2014 Books

Powered by Koha