000 06084cam a2200745 i 4500
001 on1162009242
003 OCoLC
005 20201015091048.0
006 m o d
007 cr |||||||||||
008 130124t20132013nyua ob 001 0 eng
010 _a 2020677486
040 _aDLC
_beng
_erda
_cDLC
_dVLY
_dE7B
_dYDXCP
_dN$T
_dOCLCF
_dEBLCP
_dAGLDB
_dOTZ
_dVTS
_dAU@
_dSTF
019 _a849920422
_a851034703
_a1058447273
_a1119125336
_a1158112886
_a1158969613
_a1160539320
020 _a9781624172212
_qebook
020 _a1624172210
020 _z1624172040
_qhardcover
020 _z9781624172045
_qhardcover
029 1 _aAU@
_b000062325793
029 1 _aCHNEW
_b000604791
029 1 _aDEBBG
_bBV043106260
029 1 _aDEBSZ
_b429940203
035 _a(OCoLC)1162009242
_z(OCoLC)849920422
_z(OCoLC)851034703
_z(OCoLC)1058447273
_z(OCoLC)1119125336
_z(OCoLC)1158112886
_z(OCoLC)1158969613
_z(OCoLC)1160539320
042 _apcc
050 0 0 _aQA76.9.A25
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 0 _a005.8
_223
049 _aMAIN
245 0 0 _aAdvances in security information management :
_bperceptions and outcomes /
_cGuillermo Su�arez de Tangil and Esther Palomar, editors.
264 1 _aNew York :
_bNova Publishers,
_c[2013]
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aComputer science, technology and applications
504 _aIncludes bibliographical references and index.
588 _aDescription based on print version record and CIP data provided by publisher.
546 _aEnglish.
505 0 _aADVANCES IN SECURITY INFORMATION MANAGEMENT ; ADVANCES IN SECURITY INFORMATION MANAGEMENT ; CONTENTS ; PREFACE ; SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS ... A NEED IN THE REAL WORLD; Abstract; 1. Introduction; 2. Security Evolution; 2.1. Attack Evolution; 2.2.Compliance; 3. Traditional Incident Handling Strategies; 3.1. Passive Tools; 3.1.1. IDS; 3.1.2. Operating System (OS) Detection; 3.1.3. User Identi cation; 3.2. Active Tools; 3.2.1. Firewalls; 3.2.2. Intrusion Prevention Systems; 3.2.3. Web Content Filtering; 3.2.4. Anti-Virus; 3.2.5. Web Application Firewalls.
505 8 _a3.2.6. Data or Information Leakage Prevention3.3. Proactive Tools; 3.3.1. Vulnerability Assessment; 3.3.2. Exploit Tools and Penetration Testing; 3.4. Attacking Tools; 4. Deployment and Use ofSecurity Tools; 4.1. Proper Deployment; 4.1.1. Input for the Tools; 4.1.2.Network Access Requirements; 4.2. Log Analysis; 5. Dealing with Information Overload; 5.1. Log Correlation Basis; 5.2. Actionable Data; 5.2.1. Individual High Value True Positives Pre-SIEM; 5.2.2. SIEM Correlated True Positives; 5.2.3. Dealing with False Positives; 5.2.4. Evaluating Effectiveness: Results and Stats from SIEM; 6. AccomplishingSIEM.
505 8 _a6.1.Company Rules6.2. Management Buy-In; 6.3. Requirements and Testing; 7. SIEM Speci c Requirements; 7.1. Dealing with Standard Logs; 7.1.1. Logs need to be correctly interpreted by SIEM; 7.1.2. Support; 7.2. SIEM Defaults: Rules and Parsers; 7.3. Customization; 7.3.1. Incidents; 7.3.2. Events; 7.3.3. Fixed Hardware and Software Architectures; 7.4. Physical and Logical Implementation; 7.5. Training; 8. Role Speci c Importance; 8.1. Managed Security Services; 8.1.1. Outsourced Security Management; 8.1.2. In-House Security Management; 8.2. Incident Handlers and Analysts; 8.2.1. Tracking and Reporting.
505 8 _a8.2.2. Analysts8.2.3. Incident Response; 9. Conclusion; References; SECURITY INFORMATION AND VULNERABILITY MANAGEMENT; Abstract; 1. Introduction; 2. Software Vulnerability Evaluation; 2.1. Security Risk Evaluation; 2.2. Vulnerability Monitoring; 2.3. Perimeter Security Traf c and Risk Monitoring; 2.4. Vulnerability Recovery; 3. Security Information and Event Management; 3.1. Log information quality; 3.2. Reliable sources of security advisories; 3.3. Accurac yof the asset inventory; 3.4. Vulnerability assessment; 3.5. Firewall change management; 4. Building blocks; 4.1. Building connector.
505 8 _a4.2. Building collector4.3. Adaptive ltering and correlation; 4.4. Correlation capability; 4.5. Correlation scenario; 5. Conclusion; A Advisory Information; A1. Secunia Sample Report; A2. Oval Sample Report; B Generic Advisory Report Taxonomy; B1. Asset Sample Report; B2. Vulnerability Scan Sample Report; B3. Application Log Sample Report; B4. Firewall Sample Report; References; TOWARD A MULTISTAGE ATTACK DETECTION FRAMEWORK; Abstract; 1. Introduction; 2. Attack Scenarios; 2.1. Analysis Methodology; 2.2. Scenario Alpha; 2.2.1. General Statistics; 2.2.2. Summary of Conversations; 2.2.3. In-depth Analysis.
590 _aeBooks on EBSCOhost
_bEBSCO eBook Subscription Academic Collection - Worldwide
650 0 _aComputer security
_xManagement.
650 0 _aData protection.
_0http://id.loc.gov/authorities/subjects/sh85035859
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_xManagement.
_2fast
_0(OCoLC)fst00872493
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
655 4 _aElectronic books.
700 1 _aSu�arez de Tangil, Guillermo.
700 1 _aPalomar, Esther.
776 0 8 _iPrint version:
_tAdvances in security information management
_dNew York : Nova Publishers, [2013]
_z9781624172045 (hardcover)
_w(DLC) 2012040823
830 0 _aComputer science, technology and applications.
_0http://id.loc.gov/authorities/names/no2010162081
856 4 0 _uhttps://libproxy.firstcity.edu.my:8443/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=610654
938 _aEBL - Ebook Library
_bEBLB
_nEBL3022303
938 _aebrary
_bEBRY
_nebr10704271
938 _aEBSCOhost
_bEBSC
_n610654
938 _aYBP Library Services
_bYANK
_n10735536
994 _a92
_bMYFCU
999 _c57435
_d57435