000 02699cam a22003494a 4500
001 16526454
005 20220527073725.0
008 101101s2011 nyua 001 0 eng
010 _a 2010043139
015 _aGBB094792
_2bnb
016 7 _a015623093
_2Uk
020 _a9780071701099 (pbk.)
020 _a0071701095 (pbk.)
035 _a(OCoLC)ocn678923651
040 _aDLC
_cDLC
_dYDX
_dYDXCP
_dUKM
_dBTCTA
_dSINLB
_dCDX
_dRCE
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.S4425 2011
082 0 0 _a005.8
_222
245 0 0 _aSecurity information and event management (SIEM) implementation /
_cDavid R. Miller ... [et al.].
260 _aNew York :
_bMcGraw-Hill,
_cc2011.
300 _axxxiv, 430 p. :
_bill. ;
_c24 cm.
500 _aIncludes index.
505 8 _aMachine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.
520 _a"Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource"--
650 0 _aComputer networks
_xSecurity measures.
_98669
650 0 _aComputers
_xAccess control.
_98670
650 0 _aApplication logging (Computer science)
_98671
700 1 _aMiller, David,
_d1959 November 5-
_98672
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c2592
_d2592