|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1162009242 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
130124t20132013nyua ob 001 0 eng |
010 |
|
|
|a 2020677486
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d VLY
|d E7B
|d YDXCP
|d N$T
|d OCLCF
|d EBLCP
|d AGLDB
|d OTZ
|d VTS
|d AU@
|d STF
|d N$T
|d AJS
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 849920422
|a 851034703
|a 1058447273
|a 1119125336
|a 1158112886
|a 1158969613
|a 1160539320
|a 1187187238
|a 1249466306
|a 1257357845
|a 1298250843
|
020 |
|
|
|a 9781624172212
|q ebook
|
020 |
|
|
|a 1624172210
|
020 |
|
|
|z 1624172040
|q hardcover
|
020 |
|
|
|z 9781624172045
|q hardcover
|
029 |
1 |
|
|a AU@
|b 000062325793
|
029 |
1 |
|
|a CHNEW
|b 000604791
|
029 |
1 |
|
|a DEBBG
|b BV043106260
|
029 |
1 |
|
|a DEBSZ
|b 429940203
|
035 |
|
|
|a (OCoLC)1162009242
|z (OCoLC)849920422
|z (OCoLC)851034703
|z (OCoLC)1058447273
|z (OCoLC)1119125336
|z (OCoLC)1158112886
|z (OCoLC)1158969613
|z (OCoLC)1160539320
|z (OCoLC)1187187238
|z (OCoLC)1249466306
|z (OCoLC)1257357845
|z (OCoLC)1298250843
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Advances in security information management :
|b perceptions and outcomes /
|c Guillermo Suárez de Tangil and Esther Palomar, editors.
|
264 |
|
1 |
|a New York :
|b Nova Publishers,
|c [2013]
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Computer science, technology and applications
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
546 |
|
|
|a English.
|
505 |
0 |
|
|a ADVANCES IN SECURITY INFORMATION MANAGEMENT ; ADVANCES IN SECURITY INFORMATION MANAGEMENT ; CONTENTS ; PREFACE ; SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS ... A NEED IN THE REAL WORLD; Abstract; 1. Introduction; 2. Security Evolution; 2.1. Attack Evolution; 2.2.Compliance; 3. Traditional Incident Handling Strategies; 3.1. Passive Tools; 3.1.1. IDS; 3.1.2. Operating System (OS) Detection; 3.1.3. User Identi cation; 3.2. Active Tools; 3.2.1. Firewalls; 3.2.2. Intrusion Prevention Systems; 3.2.3. Web Content Filtering; 3.2.4. Anti-Virus; 3.2.5. Web Application Firewalls.
|
505 |
8 |
|
|a 3.2.6. Data or Information Leakage Prevention3.3. Proactive Tools; 3.3.1. Vulnerability Assessment; 3.3.2. Exploit Tools and Penetration Testing; 3.4. Attacking Tools; 4. Deployment and Use ofSecurity Tools; 4.1. Proper Deployment; 4.1.1. Input for the Tools; 4.1.2.Network Access Requirements; 4.2. Log Analysis; 5. Dealing with Information Overload; 5.1. Log Correlation Basis; 5.2. Actionable Data; 5.2.1. Individual High Value True Positives Pre-SIEM; 5.2.2. SIEM Correlated True Positives; 5.2.3. Dealing with False Positives; 5.2.4. Evaluating Effectiveness: Results and Stats from SIEM; 6. AccomplishingSIEM.
|
505 |
8 |
|
|a 6.1.Company Rules6.2. Management Buy-In; 6.3. Requirements and Testing; 7. SIEM Speci c Requirements; 7.1. Dealing with Standard Logs; 7.1.1. Logs need to be correctly interpreted by SIEM; 7.1.2. Support; 7.2. SIEM Defaults: Rules and Parsers; 7.3. Customization; 7.3.1. Incidents; 7.3.2. Events; 7.3.3. Fixed Hardware and Software Architectures; 7.4. Physical and Logical Implementation; 7.5. Training; 8. Role Speci c Importance; 8.1. Managed Security Services; 8.1.1. Outsourced Security Management; 8.1.2. In-House Security Management; 8.2. Incident Handlers and Analysts; 8.2.1. Tracking and Reporting.
|
505 |
8 |
|
|a 8.2.2. Analysts8.2.3. Incident Response; 9. Conclusion; References; SECURITY INFORMATION AND VULNERABILITY MANAGEMENT; Abstract; 1. Introduction; 2. Software Vulnerability Evaluation; 2.1. Security Risk Evaluation; 2.2. Vulnerability Monitoring; 2.3. Perimeter Security Traf c and Risk Monitoring; 2.4. Vulnerability Recovery; 3. Security Information and Event Management; 3.1. Log information quality; 3.2. Reliable sources of security advisories; 3.3. Accurac yof the asset inventory; 3.4. Vulnerability assessment; 3.5. Firewall change management; 4. Building blocks; 4.1. Building connector.
|
505 |
8 |
|
|a 4.2. Building collector4.3. Adaptive ltering and correlation; 4.4. Correlation capability; 4.5. Correlation scenario; 5. Conclusion; A Advisory Information; A1. Secunia Sample Report; A2. Oval Sample Report; B Generic Advisory Report Taxonomy; B1. Asset Sample Report; B2. Vulnerability Scan Sample Report; B3. Application Log Sample Report; B4. Firewall Sample Report; References; TOWARD A MULTISTAGE ATTACK DETECTION FRAMEWORK; Abstract; 1. Introduction; 2. Attack Scenarios; 2.1. Analysis Methodology; 2.2. Scenario Alpha; 2.2.1. General Statistics; 2.2.2. Summary of Conversations; 2.2.3. In-depth Analysis.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Suárez de Tangil, Guillermo.
|
700 |
1 |
|
|a Palomar, Esther.
|
776 |
0 |
8 |
|i Print version:
|t Advances in security information management
|d New York : Nova Publishers, [2013]
|z 9781624172045
|w (DLC) 2012040823
|
830 |
|
0 |
|a Computer science, technology and applications.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=610654
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3022303
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10704271
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 610654
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10735536
|
994 |
|
|
|a 92
|b IZTAP
|