Security Information and Event Management (SIEM) Implementation

Nonfiction, Computers, Application Software, Computer Security
Cover of the book Security Information and Event Management (SIEM) Implementation by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc. Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media Language: English
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc.
Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media
Language: English
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques

More books from McGraw-Hill Companies,Inc.

Cover of the book The Handbook of Employee Benefits: Health and Group Benefits 7/E by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book 23 - Theory of Constraints Thinking Processes by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book OCP Java SE 6 Programmer Practice Exams (Exam 310-065) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Business Scorecard, Chapter 9 - Strategy for Execution by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 5 - How to Determine, Analyze, and Interpret Your Samples by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Art of M&A Strategy: A Guide to Building Your Company's Future through Mergers, Acquisitions, and Divestitures by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Excel 2007 VBA Macro Programming by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Business Scorecard, Chapter 8 - Implementing the Six Sigma Business Scorecard by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book 15 Dangerously Mad Projects for the Evil Genius by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Algebra Demystified 2/E by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Calculus Demystified 2/E by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Mike Meyers' CompTIA A+ Certification Passport, Fourth Edition (Exams 220-701 & 220-702) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 12 - Control/Verify Phase by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book PowerShell for Microsoft SharePoint 2010 Administrators by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy