没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
试读
465页
Security Information and Event Management (SIEM) Implementation.中文翻译成:"安全信息与事件管理(SIEM)系统实现" 全书分为三个部分,第一个部分主要是讲了为什么需要SIEM,重点是SIEM的需求分析,并划分了几个需求驱动的模型;第二部分主要是讲述SIEM系统的功能设计,重点是核心的功能实现;第三个部分则介绍了业界的几款SIEM产品的设计和工作原理(包括开源的和商业的);对于国内的SIEM从业人员而言,此书有一定的参考价值.而对于客户方技术人员而言,也能够从中了解SIEM的内涵、作用和意义,并建立对SIEM运用效果的合理预期. 哈哈免费下载
资源推荐
资源详情
资源评论
Praise for Security Information and Event Management (SIEM) Implementation
“The first ever book on SIEM breaks new ground by teaching readers how to
implement and operate today’s SIEM tools.”
—Dr. Anton Chuvakin
Security Warrior Consulting
“This book provides a meticulous roadmap of the various attacks one may experience
on their organizational assets. Additionally, it clearly and concisely demonstrates
methods and best practices for configuring one’s enterprise resources to provide
quicker analysis and mitigation of threats.”
—Hank Ritzert, CISSP, ERP
Security Analyst
“The authors have teamed up for a readable and understandable book on one of
today’s important security system elements, SIEM. They have provided a good cross-
section view of the power and potential of such devices when properly deployed in
your environment. It is my opinion that if your organization is considering a SIEM
or overwhelmed by manual log review processes, Security Information and Event
Management (SIEM) Implementation is an easy-to-read guide that provides a solid
foundation to better understand deployment and tuning within your environment.”
—Jeff Comstock
Manager for IT Security and Compliance for BSRO,
a large auto and tire services provider
“Security Information and Event Management (SIEM) Implementation defines threats,
practices, and methodologies with real-world perspective. The authors’ understanding
of secure information systems is conveyed in a practical and well-structured manner.
This is THE book to read if you are planning to implement a SIEM system in your
infrastructure.”
—Andrew Creech
Director of Information Technology, Creeco Systems
Hollywood, Florida
“This book provides the complete positioning and use of a SIEM within an organization’s
security services. I was able to comprehend the use of SIEM applications offered by the
major players in this area.”
—Paul A. Mancuso, VCI, CCSI, CISSP
Instructor and Consultant of National IT Training & Certification Institute (NITTCI)
“The authors have done an excellent job capturing the broad scope of security threats
in a concise and accurate manner, and then providing the critical answer to the question:
‘What do we do about it?’ This book is great for managers and IT professionals to
understand the critical requirements for securing information systems.”
—Eric R. Davis, MAJ,
U.S. Army Information Systems Security Professional
“The more you know, the luckier you will become. Great success and/or failure can
come from implementing a SIEM solution. I have seen organizations spend millions
of dollars buying a SIEM only to have it collect events just for regulatory concerns,
or worse buying a tool that effectively acts as a false sense of security, while others
use the tool to its greatest capacity for a true proactive and reactive security posture.
Remember that although organizing assets and classifying data may seem insignificant,
it is the most crucial task in your SIEM solution to aid in consequently responding and
identifying future and current attack patterns. If you ask the right questions, you will
acquire the right answers, thus increasing the intelligence of your SIEM and the fluid
intelligence of your analyst.
It is the goal of the authors of this book to help you know more and ask the right
questions to better your security and implementation of event correlation and to better
threat management within your enterprise.”
—Daniel Clemens
Owner and Security Practitioner @ Packetninjas LLC
Security Information and
Event Management (SIEM)
Implementation
DAVID R. MILLER
SHON HARRIS
ALLEN A. HARPER
STEPHEN VANDYKE
CHRIS BLASK
New York Chicago San Francisco
Lisbon London Madrid Mexico City Milan
New Delhi San Juan Seoul Singapore Sydney Toronto
Copyright © 2011 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of
1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system,
without the prior written permission of the publisher.
ISBN: 978-0-07-170108-2
MHID: 0-07-170108-7
The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-170109-9,
MHID: 0-07-170109-5.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked
name, we use names in an editorial fashion only, and to the benefi t of the trademark owner, with no intention of infringement of the
trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training
programs. To contact a representative please e-mail us at bulksales@mcgraw-hill.com.
Trademarks: McGraw-Hill, the McGraw-Hill Publishing logo, and related trade dress are trademarks or registered trademarks of The
McGraw-Hill Companies and/or its affi liates in the United States and other countries and may not be used without written permission.
All other trademarks are the property of their respective owners. The McGraw-Hill Companies is not associated with any product or
vendor mentioned in this book.
Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or
mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of
any information and is not responsible for any errors or omissions or the results obtained from the use of such information.
TERMS OF USE
This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGrawHill”) and its licensors reserve all rights in and to the
work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve
one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon,
transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use
the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may
be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS
TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK,
INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE,
AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not
warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or
error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless
of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information ac-
cessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special,
punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised
of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause
arises in contract, tort or otherwise.
剩余464页未读,继续阅读
资源评论
- mengdai19912016-04-08赞,谢谢分享!!!
桃花饼饼
- 粉丝: 2
- 资源: 6
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 青岛大学人工智能实验二 利用α-β搜索的博弈树算法编写一字棋游戏
- ### 1、项目介绍 本项目Scrapy进行数据爬取,并使用Django框架+PyEcharts实现可视化大屏 效果如下:
- # 微信小程序-健康菜谱 基于微信小程序的一个查找检索菜谱的应用 ### 效果 !动态图(./res/gif/demo
- zabbix-get命令包资源
- 289ssm-mysql-jsp 计算机课程实验管理系统.zip(可运行源码+数据库文件+文档)
- 毕业设计,基于PyQt5实现的可视化界面的Python车牌自动识别系统源码
- 20-天天果园项目.rar
- 26-朴素贝叶斯分类.rar
- 没有安Matlab 也可以 生成FIR抽头系数工具.py
- 自助购药小程序源代码含文档
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功