Security Information and Event Management (SIEM) Implementation

Nonfiction, Computers, Application Software, Computer Security
Cover of the book Security Information and Event Management (SIEM) Implementation by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc. Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media Language: English
Author: David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
ISBN: 9780071701082
Publisher: McGraw-Hill Companies,Inc.
Publication: October 15, 2010
Imprint: McGraw-Hill Osborne Media
Language: English
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Implement SIEM to efficiently analyze and report data, respond to inside and outside threats, and follow compliance regulations Security Information and Event Management (SIEM) Implementation shows how to take advantage of SIEM technology for real-time analysis of security alerts generated by network hardware and applications. The book explains how to implement multiple SIEM products from different vendors, and also discusses the strengths, weaknesses, and advanced tuning of these various systems. This comprehensive guide covers everything from basic concepts and components to high-level configuration, risk and threat analysis, interpretation, and response. The separate pieces that make up a complete SIEM system are outlined, and techniques for deploying an integrated collection of discrete SIEM pieces to meet your requirements are presented. You will also learn how to extend SIEM tools to develop business intelligence solutions. Security Information and Event Management (SIEM) Implementation Includes a Smartbook a knowledge base of real-world business use cases illustrating successfully deployed, finely-tuned SIEM systems Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Is written by security, SIEM, and compliance experts Includes product feature summaries and analyses and trending examples Covers regulatory compliance issues and provides Incident Response solutions All-inclusive coverage: Introduction to Threat Intelligence For IT Systems; Business Models; Threat Models; Compliance; SIEM Concepts - Components for small and medium size businesses; The Anatomy of SIEM Systems; Incident Response; SIEM for Business Intelligence; SIEM Tools; AlientVault OSSIM Implementation; AlienVault OSSIM Advanced Techniques; Cisco Security-MARS Implementation; Cisco Security-MARS Advanced Techniques; Q1 Labs QRadar Implementation; Q1 Labs Advanced Techniques; ArcSight Implementation; ArcSight Advanced Techniques

More books from McGraw-Hill Companies,Inc.

Cover of the book Ownership Thinking: How to End Entitlement and Create a Culture of Accountability, Purpose, and Profit by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Oracle Database Administration for Microsoft SQL Server DBAs by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Practice Makes Perfect German Conversation by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Mike Meyers CompTIA A+ Guide: Essentials Lab Manual, Third Edition (Exam 220-701) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 5 - How to Determine, Analyze, and Interpret Your Samples by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Practical PowerPivot & DAX Formulas for Excel 2010 by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Reverse Deception Organized Cyber Threat Counter-Exploitation by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 7 - Statistical Process Control by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 13 - Measurement Systems Analysis -- MSA: Is Your Measurement Process Lying to You? by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Six Sigma Business Scorecard, Chapter 6 - Six Sigma Business Scorecard Development by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 5 - Lean Six Sigma Applications to Materials Requirements Planning (MRPII) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book 1-Introduction to TOC-My Perspective (EBOOK) by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book The Art of M&A Strategy: A Guide to Building Your Company's Future through Mergers, Acquisitions, and Divestitures by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
Cover of the book Mac OS X System Administration by David Miller, Zachary Payton, Allen Harper, Chris Blask, Stephen VanDyke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy