Skip to contents

  1. Miller, David [Other]

    Security information and event management (SIEM) implementation : [enable real-time monitoring and analysis of security events ; respond quickly to attacks, log security data, and generate compliance reports ; get details on leading SIEM products - AlienVault OSSIM, Cisco-MARS, ArcSight ESM, and Q1 Labs QRadar]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York, NY [u.a.]: McGraw-Hill, c 2011

    Published in: Network pro library

  2. Yang, Christopher C. [Other]; Wang, Fei-Yue [Other]; Zeng, Daniel [Other]; Zhan, Justin [Other]; Carley, Kathleen [Other]; Chang, Kuiyu [Other]; Chau, Michael [Other]; Chen, Hsinchun [Other]; Chen, Patrick S. [Other]; Hsieh, Raymond [Other]; Lang, Sheau-Dong [Other]; Mao, Wenji [Other]

    Intelligence and Security Informatics : IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin, Heidelberg: Springer Berlin Heidelberg, 2008

    Published in: Lecture notes in computer science ; 5075

  3. Hutchison, David [Other]; Naor, Moni [Other]; Nierstrasz, Oscar [Other]; Pandu Rangan, C. [Other]; Steffen, Bernhard [Other]; Sudan, Madhu [Other]; Terzopoulos, Demetri [Other]; Tygar, Doug [Other]; Vardi, Moshe Y. [Other]; Weikum, Gerhard [Other]; Yang, Christopher C. [Other]; Chau, Michael [Other]; Chen, Hsinchun [Other]; Kanade, Takeo [Other]; Kittler, Josef [Other]; Kleinberg, Jon [Other]; Li, Shu-hsing [Other]; Mattern, Friedemann [Other]; Mitchell, John C. [Other]

    Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin, Heidelberg: Springer Berlin Heidelberg, 2009

    Published in: Lecture notes in computer science ; 5477