000 01640cam a22002538i 4500
005 20251223120525.0
008 241001s2025 nju ob 001 0 eng c
020 _a9781394201624
020 _a9781394201617
041 _aeng
082 0 0 _a005.8068
100 1 _aBasta, Alfred,
245 1 0 _aOpen-source security operations center (SOC) :
_ba complete guide to establishing, managing, and maintaining a modern SOC /
_cAlfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar.
300 _a1 online resource
520 _a"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"--
650 0 _aCyberinfrastructure
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCyberterrorism
_xPrevention.
700 1 _aBasta, Nadine,
700 1 _aAnwar, Waqar,
700 1 _aEssar, Mohammad Ilyas,
856 _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10896967
942 _cBK
999 _c7829
_d7829