Establishing Security Operations Center (notice n° 1556185)

détails MARC
000 -LEADER
fixed length control field 03891cam a2200277zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88971649
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251020124039.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251020s2025 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789365896060
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88971649
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Vasant Kulkarni, Sameer
245 01 - TITLE STATEMENT
Title Establishing Security Operations Center
Remainder of title Cyber incident detection analysis and threat hunting for robust security operations (English Edition)
Statement of responsibility, etc. ['Vasant Kulkarni, Sameer']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer BPB Publications
Date of production, publication, distribution, manufacture, or copyright notice 2025
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. DescriptionCyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and how it helps organizations stay protected 24/7.This book systematically covers the entire lifecycle of a SOC, beginning with cybersecurity fundamentals, the threat landscape, and the profound implications of cyber incidents. It will guide you through why SOCs are critical in today’s cyber landscape, how to build one from the ground up, tools, roles, and real-life examples from the industry. The handling of security incidents before they turn into threats can be effective through this book. The entire ecosystem of management of security operations is covered to effectively handle and mitigate them.Upon completing this guide, you will possess a holistic understanding of SOC operations, equipped with the knowledge to strategically plan, implement, and continuously enhance your organization's cybersecurity posture, confidently navigating the complexities of modern digital defense. The book aims to empower the readers to take on the complexities of cybersecurity handling.What you will learn? Understand SOC evolution, core domains like asset/compliance management, and modern frameworks.? Implement log management, SIEM use cases, and incident response lifecycles.? Leverage threat intelligence lifecycles and proactive threat hunting methodologies.? Adapt SOCs to AI/ML, cloud, and other emerging technologies for future resilience.? Integrate SOC operations with business continuity, compliance, and industry frameworks.Who this book is forThe book serves as a guide for those who are interested in managing the facets of SOC. The responders at level 1, analysts at level 2, and senior analysts at level 3 can gain insights to refresh their understanding and provide guidance for career professionals. This book aims to equip professionals, from analysts to executives, with the knowledge to build scalable, resilient SOCs that are ready to confront emerging challenges.Table of ContentsSection 1: Understanding Security Operations Center1. Cybersecurity Basics2. Cybersecurity Ramifications and Implications3. Evolution of Security Operations Centers4. Domains of Security Operations Centers5. Modern Developments in Security Operations Centers6. Incident ResponseSection 2: SOC Components7. Analysis8. Threat Intelligence and Hunting9. PeopleSection 3: Implementing SOC10. Process11. Technology12. Building Security Operations Centers Infrastructure13. Business ContinuitySection 4: Practical Implementation Aspects14. Frameworks15. Best PracticesSection 5: Changing Dynamics of SOC with Evolving Threats Fueled by Emerging Technologies16. Impact of Emerging Technologies17. Cyber Resilient Systems18. Future Directions
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Vasant Kulkarni, Sameer
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88971649">https://international.scholarvox.com/netsen/book/88971649</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025