| 000 | 02429nam a2200253 4500 | ||
|---|---|---|---|
| 005 | 20250802144137.0 | ||
| 008 | 250802b2025|||||||| |||| 00| 0 eng d | ||
| 020 | _a9781394201617 | ||
| 041 | _aEnglish | ||
| 082 | _a005.8068 | ||
| 100 |
_aBasta, Alfred _eAuthor _97188 |
||
| 100 |
_aBasta, Nadine _eCo-Author _97189 |
||
| 100 |
_aAnwar, Waqar _eCo-Author _97190 |
||
| 100 |
_aEssar, Mohammad Ilyas _eCo-Author _97191 |
||
| 245 | _aOpen-source security operations center (SOC): A complete guide to establishing, managing, and maintaining a modern SOC | ||
| 260 |
_aNew Jersey: _bWiley Data and Cybersecurity, _c2025. |
||
| 300 | _axiv, 466p. | ||
| 500 | _aA comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find: A modular design that facilitates use in a variety of classrooms and instructional settings Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products. | ||
| 650 |
_aLog and Event Analysis and Network Traffic Analysis _97192 |
||
| 650 |
_aEndpoint Analysis and Threat Hunting _97193 |
||
| 650 |
_aSecurity Information and Event Management (SIEM) _97194 |
||
| 856 | _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10896967 | ||
| 942 | _cEB | ||
| 999 |
_c1774 _d1774 |
||