| 000 | 01640cam a22002538i 4500 | ||
|---|---|---|---|
| 005 | 20251223120525.0 | ||
| 008 | 241001s2025 nju ob 001 0 eng c | ||
| 020 | _a9781394201624 | ||
| 020 | _a9781394201617 | ||
| 041 | _aeng | ||
| 082 | 0 | 0 | _a005.8068 |
| 100 | 1 | _aBasta, Alfred, | |
| 245 | 1 | 0 |
_aOpen-source security operations center (SOC) : _ba complete guide to establishing, managing, and maintaining a modern SOC / _cAlfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar. |
| 300 | _a1 online resource | ||
| 520 | _a"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- | ||
| 650 | 0 |
_aCyberinfrastructure _xSecurity measures. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aCyberterrorism _xPrevention. |
|
| 700 | 1 | _aBasta, Nadine, | |
| 700 | 1 | _aAnwar, Waqar, | |
| 700 | 1 | _aEssar, Mohammad Ilyas, | |
| 856 | _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10896967 | ||
| 942 | _cBK | ||
| 999 |
_c7829 _d7829 |
||