Open-source security operations center (SOC) : (Record no. 7829)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01640cam a22002538i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251223120525.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 241001s2025 nju ob 001 0 eng c |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394201624 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781394201617 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8068 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Basta, Alfred, |
| 245 10 - TITLE STATEMENT | |
| Title | Open-source security operations center (SOC) : |
| Remainder of title | a complete guide to establishing, managing, and maintaining a modern SOC / |
| Statement of responsibility, etc | Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 1 online resource |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cyberinfrastructure |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer networks |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Cyberterrorism |
| General subdivision | Prevention. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Basta, Nadine, |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Anwar, Waqar, |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Essar, Mohammad Ilyas, |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=10896967 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Withdrawn status | Lost status | Damaged status | Home library | Current library | Date acquired | Full call number | Accession Number | Bill Date/Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|
| Indian Institute of Technology Tirupati | Indian Institute of Technology Tirupati | 23/12/2025 | 005.8068 | EB00776 | 23/12/2025 | Books |