TY - BOOK
AU - Miller, David
TI - Security information and event management (SIEM) implementation [enable real-time monitoring and analysis of security events ; respond quickly to attacks, log security data, and generate compliance reports ; get details on leading SIEM products - AlienVault OSSIM, Cisco-MARS, ArcSight ESM, and Q1 Labs QRadar]
PB - McGraw-Hill
SN - 0071701095
SN - 9780071701099
KW - Computer networks Security measures
KW - Computers Access control
KW - Application logging (Computer science)
KW - Rechnernetz
KW - Computersicherheit
KW - Informationsmanagement
PY - c 2011
N2 - Includes index
N2 - Machine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.
BT - Network pro library
CY - New York, NY [u.a.]
UR - http://slubdd.de/katalog?TN_libero_mab2
ER -
Download citation