Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Open-source security operations cent...
~
Basta, Alfred.
Linked to FindBook
Google Book
Amazon
博客來
Open-source security operations center (SOC) = a complete guide to establishing, managing, and maintaining a modern SOC /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Open-source security operations center (SOC)/ Alfred Basta ... [et al.]
Reminder of title:
a complete guide to establishing, managing, and maintaining a modern SOC /
other author:
Basta, Alfred.
Published:
Hoboken, NJ :John Wiley & Sons, : c2025.,
Description:
1 online resource (483 p.)
Subject:
Cyberinfrastructure - Security measures. -
Online resource:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631
ISBN:
9781394201631
Open-source security operations center (SOC) = a complete guide to establishing, managing, and maintaining a modern SOC /
Open-source security operations center (SOC)
a complete guide to establishing, managing, and maintaining a modern SOC /[electronic resource] :Alfred Basta ... [et al.] - 1st ed. - Hoboken, NJ :John Wiley & Sons,c2025. - 1 online resource (483 p.)
Includes bibliographical references and index.
"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"--
ISBN: 9781394201631Subjects--Topical Terms:
1581344
Cyberinfrastructure
--Security measures.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8068
Open-source security operations center (SOC) = a complete guide to establishing, managing, and maintaining a modern SOC /
LDR
:02046cmm a2200325 a 4500
001
2416692
005
20251017072503.0
006
m o d
007
cr cnu---unuuu
008
260303s2025 nju ob 001 0 eng d
020
$a
9781394201631
$q
(electronic bk.)
020
$a
139420163X
$q
(electronic bk.)
020
$a
9781394201617
$q
(electronic bk. ;
$q
adobe pdf)
020
$a
1394201613
$q
(electronic bk. ;
$q
adobe pdf)
020
$a
9781394201624
$q
(electronic bk. ;
$q
epub)
020
$a
1394201621
$q
(electronic bk. ;
$q
epub)
020
$z
9781394201600
$q
(hardback)
020
$z
1394201605
$q
(hardback)
035
$a
9781394201631
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
MiAaPQ
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8068
$2
23
245
0 0
$a
Open-source security operations center (SOC)
$h
[electronic resource] :
$b
a complete guide to establishing, managing, and maintaining a modern SOC /
$c
Alfred Basta ... [et al.]
250
$a
1st ed.
260
$a
Hoboken, NJ :
$b
John Wiley & Sons,
$c
c2025.
300
$a
1 online resource (483 p.)
504
$a
Includes bibliographical references and index.
520
$a
"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"--
$c
Provided by publisher.
588
$a
Description based on publisher supplied metadata and other sources.
650
0
$a
Cyberinfrastructure
$x
Security measures.
$3
1581344
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Cyberterrorism
$x
Prevention.
$3
819287
700
1
$a
Basta, Alfred.
$3
3795575
856
4 0
$u
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394201631
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9521705
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login