|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn987790896 |
003 |
OCoLC |
005 |
20231120112231.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170523s2017 enk o 001 0 eng d |
010 |
|
|
|a 2017932729
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d EBLCP
|d UIU
|d OPELS
|d N$T
|d CNCGM
|d OCLCF
|d MERER
|d YDX
|d NLE
|d OCLCQ
|d OTZ
|d D6H
|d U3W
|d MERUC
|d OCLCQ
|d CEF
|d OCLCQ
|d WYU
|d ABC
|d UKMGB
|d OCLCQ
|d S2H
|d OCLCO
|d LVT
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB783945
|2 bnb
|
016 |
7 |
|
|a 018345005
|2 Uk
|
019 |
|
|
|a 987809552
|a 999553363
|a 1005105755
|a 1005343981
|a 1066430245
|a 1229336178
|a 1235841550
|
020 |
|
|
|a 9780128036822
|q (electronic bk.)
|
020 |
|
|
|a 0128036826
|q (electronic bk.)
|
020 |
|
|
|z 9780128036570
|q (print)
|
020 |
|
|
|z 0128036575
|
035 |
|
|
|a (OCoLC)987790896
|z (OCoLC)987809552
|z (OCoLC)999553363
|z (OCoLC)1005105755
|z (OCoLC)1005343981
|z (OCoLC)1066430245
|z (OCoLC)1229336178
|z (OCoLC)1235841550
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Jarpey, Gregory,
|e author.
|
245 |
1 |
0 |
|a Security operations center guidebook :
|b a practical guide for a successful SOC /
|c Gregory Jarpey, R. Scott McCoy.
|
264 |
|
1 |
|a Kidlington, Oxford, United Kingdom :
|b Butterworth-Heinemann is an imprint of Elsevier,
|c 2017.
|
264 |
|
4 |
|c �2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Front Cover; Security Operations Center Guidebook; Copyright Page; Dedication; Contents; Introduction; A Rocky Start; I. Developing Your Security Operations Center; 1 What is a Security Operations Center?; Third Party; Hybrid; Dedicated; Historical Lessons; 2 Needs Assessment; Risk Assessment; Types of Companies; A Single Suite in a Larger Office Complex That Operates Primarily During Business Hours; A Single Location Dedicated to Only Your Company, with no Other Tenants; A Single Campus with Multiple Buildings; Multiple Locations Located in the Same Metro Area.
|
505 |
8 |
|
|a Multiple Locations Spread across a Single Country and Multiple Locations Spread across Several CountriesAdditional Considerations; Historical Lessons; Vulnerable Adults; Modest Beginnings; 3 Business Case; Example; Historical Lessons; First Attempt; A Unique Approach; 4 Building Your SOC; Workstations; Historical Lessons; 5 Staffing Options; Training; Career Progression; Retention; Historical Lessons; II. Operations; 6 Responsibilities and Duties; Introduction; Welcome to the SOC-You Have an Important Role; Mission Statement; SCO Job Description; Sample SCO Job Description; Position Summary.
|
505 |
8 |
|
|a Duties and ResponsibilitiesQualifications; Physical Demands/Environmental Conditions; Hiring and Interviewing Your SCO Candidate; Sample Interview Questions for a SCO; Staffing and Schedule; Sample Three-Week Rotation; Supervisory Authority; Staff Responsibility; Historical Lessons; 7 Post Orders and Procedures; Introduction; Setting Up Your Post Orders; Create a Shared Email Address for Security Inquiries and Requests; Performance of Duties; Example Post Order Table of Contents Setup and Their Purpose; Chapter One-Introduction; Chapter Two-Duties; Chapter Three-Call Center Procedures.
|
505 |
8 |
|
|a Chapter Four-Emergency ProceduresChapter Five-Standards and Policies; Chapter Six-Equipment Procedures; Chapter Seven-Post Order Changes and Updates; Chapter Eight-Appendices; Site Procedures; Section One-Site Info; Section Two-Intrusion Alarm Response; Section Three-Fire Alarm Response; Section Four-Mechanical Alarms; Section Five-Contact Lists; Section Six-Special Instructions; Historical Lessons; 8 Training Programs; Introduction; Getting Started; New Hire Training Schedule; Individual Training Checklist; Monthly, Quarterly, and Annual Training; Historical Lessons.
|
505 |
8 |
|
|a 9 Enterprise Access ControlIntroduction; Setting Up Your Physical Access Control System; Operator Permissions; Card Access Programming and Control; Setting up and Controlling Your Restricted Areas Access; Creating a Restricted Area; Access Approvals, Denials, and Removals; Access Control Matrix; Site Access Control; Follow These Steps; System Status Checks; Troubleshooting; Historical Lessons; 10 Alarm Monitoring; Introduction; Physical Access Control System (PACS) or Intrusion Detection System (IDS) Alarms; Alarm Instructions; Receiving Alarms.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed June 5, 2017).
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a McCoy, R. Scott,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Jarpey, Gregory.
|t Security operations center guidebook.
|d �2017
|z 0128036575
|z 9780128036570
|w (OCoLC)962889202
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128036570
|z Texto completo
|