Open-source security operations center (SOC): A complete guide to establishing, managing, and maintaining a modern SOC (Record no. 1774)

MARC details
000 -LEADER
fixed length control field 02429nam a2200253 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250802144137.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250802b2025|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394201617
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8068
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Basta, Alfred
Relator term Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Basta, Nadine
Relator term Co-Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Anwar, Waqar
Relator term Co-Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Essar, Mohammad Ilyas
Relator term Co-Author
245 ## - TITLE STATEMENT
Title Open-source security operations center (SOC): A complete guide to establishing, managing, and maintaining a modern SOC
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2025.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xiv, 466p.
500 ## - GENERAL NOTE
General note A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment<br/><br/>In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points.<br/><br/>In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find:<br/><br/>A modular design that facilitates use in a variety of classrooms and instructional settings<br/>Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery<br/>Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention<br/>Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Log and Event Analysis and Network Traffic Analysis
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Endpoint Analysis and Threat Hunting
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Security Information and Event Management (SIEM)
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10896967
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.8068 EB0198 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha