Security Information and Event Management (SIEM) Implementation

Nonfiction, Computers, Application Software, Computer Security
Cover of the book Security Information and Event Management (SIEM) Implementation by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc. Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media Language: English
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc.
Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media
Language: English
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques

More books from McGraw-Hill Companies,Inc.

Cover of the book Managing Virtual Teams by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 5 - Project Management Using DMAIC and DMADV by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book 38 - Theory of Constraints for Personal Productivity Dilemmas by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition (Exams 220-701 & 220-702) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Java Demystified by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 5 - How to Determine, Analyze, and Interpret Your Samples by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book JavaScript Demystified by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book IT Auditing Using Controls to Protect Information Assets 2/E by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Art of M&A Strategy: A Guide to Building Your Company's Future through Mergers, Acquisitions, and Divestitures by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Lean Six Sigma, Chapter 1 - Lean Six Sigma: Creating Breakthrough Profit Performance by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 8 - Root Cause Analysis Using Six Sigma Tools (With Operations Research Methods) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 10 - Analyze Phase by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Digestive Wellness, Fourth Edition: Strengthen the Immune System and Prevent Disease Through Healthy Digestion by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 10 - Regression Analysis by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Mike Meyers' CompTIA A+ Guide: Practical Application, Third Edition (Exam 220-702) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy