Open-source security operations center (SOC): A complete guide to establishing, managing, and maintaining a modern SOC (Record no. 1774)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02429nam a2200253 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250802144137.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250802b2025|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394201617 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8068 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Basta, Alfred |
| Relator term | Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Basta, Nadine |
| Relator term | Co-Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Anwar, Waqar |
| Relator term | Co-Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Essar, Mohammad Ilyas |
| Relator term | Co-Author |
| 245 ## - TITLE STATEMENT | |
| Title | Open-source security operations center (SOC): A complete guide to establishing, managing, and maintaining a modern SOC |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2025. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xiv, 466p. |
| 500 ## - GENERAL NOTE | |
| General note | A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment<br/><br/>In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points.<br/><br/>In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find:<br/><br/>A modular design that facilitates use in a variety of classrooms and instructional settings<br/>Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery<br/>Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention<br/>Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Log and Event Analysis and Network Traffic Analysis |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Endpoint Analysis and Threat Hunting |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Security Information and Event Management (SIEM) |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10896967 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 005.8068 | EB0198 | e-Books |