000 02794cam a22003854a 4500
001 16526454
003 AUCL
005 20231016100640.0
008 101101s2011 nyua 001 0 eng
010 _a 2010043139
015 _aGBB094792
_2bnb
016 7 _a015623093
_2Uk
020 _a9780071701099 (pbk.)
020 _a0071701095 (pbk.)
035 _a(OCoLC)ocn678923651
040 _aDLC
_cAUCL
_dYDX
_dYDXCP
_dUKM
_dBTCTA
_dSINLB
_dCDX
_dRCE
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.S4425 2011
082 0 0 _a005.8
_bMIL-S
084 _a005.8
_2MIL-S
100 _aMiller R. Ddavid
_dShon Harris
245 0 0 _aSecurity Information and Event Management (SIEM) Implementation
_cDavid R. Miller ... [et al.].
260 _aNew York :
_bMcGraw-Hill,
_c2011
300 _axxxiv, 430 p. :
_bill. ;
_c24 cm.
500 _aIncludes index.
505 8 _aMachine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.
520 _a"Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource"--
_cProvided by publisher.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputers
_xAccess control.
650 0 _aApplication logging (Computer science)
700 1 _aMiller, David,
_d1959 November 5-
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c25439
_d25439