Matches in Library of Congress for { <http://lccn.loc.gov/2010043139> ?p ?o. }
Showing items 1 to 21 of
21
with 100 items per page.
- 2010043139 contributor B11788330.
- 2010043139 created "c2011.".
- 2010043139 date "2011".
- 2010043139 date "c2011.".
- 2010043139 dateCopyrighted "c2011.".
- 2010043139 description "Machine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.".
- 2010043139 extent "xxxiv, 430 p. :".
- 2010043139 identifier "0071701095 (pbk.)".
- 2010043139 identifier "9780071701099 (pbk.)".
- 2010043139 issued "2011".
- 2010043139 issued "c2011.".
- 2010043139 language "eng".
- 2010043139 publisher "New York : McGraw-Hill,".
- 2010043139 subject "005.8 22".
- 2010043139 subject "Application logging (Computer science)".
- 2010043139 subject "Computer networks Security measures.".
- 2010043139 subject "Computers Access control.".
- 2010043139 subject "TK5105.59 .S4425 2011".
- 2010043139 tableOfContents "Machine generated contents note: Part I: Introduction to Threat Intelligence For IT Systems -- Chapter 1 Business Models -- Chapter 2 Threat Models -- Chapter 3 Compliance -- Part II: IT Threat Intelligence Using SIEM Systems -- Chapter 4 SIEM Concepts - Components for small and medium size businesses -- Chapter 5 The Anatomy of a SIEM -- Chapter 6 Incident Response -- Chapter 7 Using SIEM for Business Intelligence -- Part III: SIEM Tools -- Chapter 8 AlienVault OSSIM Implementation -- Chapter 9 AlienVault OSSIM Operation -- Chapter 10 Cisco Security-MARS Implementation -- Chapter 11 Cisco Security-MARS Advanced Techniques -- Chapter 12 Q1 Labs QRadar Implementation -- Chapter 13 Q1 Labs QRadar Advanced Techniques -- Chapter 14 ArcSight Implementation -- Chapter 15 ArcSight ESM Advanced Techniques -- Appendix SmartBook.".
- 2010043139 title "Security information and event management (SIEM) implementation / David R. Miller ... [et al.].".
- 2010043139 type "text".