Open-source security operations center (SOC): a complete guide to establishing, managing, and maintaining a modern SOC
"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emerg...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, New Jersey
Wiley
[2025]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781394201600/?ar |
Summary: | "The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- |
Item Description: | Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Physical Description: | 1 Online-Ressource |
ISBN: | 9781394201624 1394201621 9781394201617 1394201613 9781394201631 139420163X 9781394201600 |
Staff View
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-109653815 | ||
003 | DE-627-1 | ||
005 | 20241107103331.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241107s2025 xx |||||o 00| ||eng c | ||
020 | |a 9781394201624 |c epub |9 978-1-394-20162-4 | ||
020 | |a 1394201621 |9 1-394-20162-1 | ||
020 | |a 9781394201617 |c adobe pdf |9 978-1-394-20161-7 | ||
020 | |a 1394201613 |9 1-394-20161-3 | ||
020 | |a 9781394201631 |c electronic book |9 978-1-394-20163-1 | ||
020 | |a 139420163X |c electronic book |9 1-394-20163-X | ||
020 | |a 9781394201600 |9 978-1-394-20160-0 | ||
035 | |a (DE-627-1)109653815 | ||
035 | |a (DE-599)KEP109653815 | ||
035 | |a (ORHE)9781394201600 | ||
035 | |a (DE-627-1)109653815 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8068 |2 23/eng/20241017 | |
100 | 1 | |a Basta, Alfred |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Open-source security operations center (SOC) |b a complete guide to establishing, managing, and maintaining a modern SOC |c Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar |
263 | |a 2411 | ||
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2025] | |
264 | 4 | |c ©2025 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a "The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- | ||
650 | 0 | |a Cyberinfrastructure |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Cyberterrorism |x Prevention | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computer security | |
650 | 0 | |a Open source software | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
700 | 1 | |a Basta, Nadine |e VerfasserIn |4 aut | |
700 | 1 | |a Anwar, Waqar |e VerfasserIn |4 aut | |
700 | 1 | |a Essar, Mohammad Ilyas |e VerfasserIn |4 aut | |
710 | 2 | |a John Wiley & Sons, |e Verlag |4 pbl | |
776 | 1 | |z 9781394201600 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781394201600 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781394201600/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-109653815 |
---|---|
_version_ | 1829007832168529920 |
adam_text | |
any_adam_object | |
author | Basta, Alfred Basta, Nadine Anwar, Waqar Essar, Mohammad Ilyas |
author_facet | Basta, Alfred Basta, Nadine Anwar, Waqar Essar, Mohammad Ilyas |
author_role | aut aut aut aut |
author_sort | Basta, Alfred |
author_variant | a b ab n b nb w a wa m i e mi mie |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)109653815 (DE-599)KEP109653815 (ORHE)9781394201600 |
dewey-full | 005.8068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8068 |
dewey-search | 005.8068 |
dewey-sort | 15.8068 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03168nam a22006132c 4500</leader><controlfield tag="001">ZDB-30-ORH-109653815</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241107103331.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241107s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394201624</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-394-20162-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394201621</subfield><subfield code="9">1-394-20162-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394201617</subfield><subfield code="c">adobe pdf</subfield><subfield code="9">978-1-394-20161-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394201613</subfield><subfield code="9">1-394-20161-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394201631</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-394-20163-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">139420163X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-394-20163-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394201600</subfield><subfield code="9">978-1-394-20160-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109653815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP109653815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781394201600</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)109653815</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8068</subfield><subfield code="2">23/eng/20241017</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Basta, Alfred</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Open-source security operations center (SOC)</subfield><subfield code="b">a complete guide to establishing, managing, and maintaining a modern SOC</subfield><subfield code="c">Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">2411</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Basta, Nadine</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anwar, Waqar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Essar, Mohammad Ilyas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">John Wiley & Sons,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781394201600</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781394201600</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781394201600/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-109653815 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:34Z |
institution | BVB |
isbn | 9781394201624 1394201621 9781394201617 1394201613 9781394201631 139420163X 9781394201600 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Wiley |
record_format | marc |
spelling | Basta, Alfred VerfasserIn aut Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar 2411 Hoboken, New Jersey Wiley [2025] ©2025 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed "The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- Cyberinfrastructure Security measures Computer networks Security measures Cyberterrorism Prevention Computer security Management Computer security Open source software Sécurité informatique ; Gestion Sécurité informatique Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures Basta, Nadine VerfasserIn aut Anwar, Waqar VerfasserIn aut Essar, Mohammad Ilyas VerfasserIn aut John Wiley & Sons, Verlag pbl 9781394201600 Erscheint auch als Druck-Ausgabe 9781394201600 |
spellingShingle | Basta, Alfred Basta, Nadine Anwar, Waqar Essar, Mohammad Ilyas Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC Cyberinfrastructure Security measures Computer networks Security measures Cyberterrorism Prevention Computer security Management Computer security Open source software Sécurité informatique ; Gestion Sécurité informatique Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures |
title | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC |
title_auth | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC |
title_exact_search | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC |
title_full | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar |
title_fullStr | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar |
title_full_unstemmed | Open-source security operations center (SOC) a complete guide to establishing, managing, and maintaining a modern SOC Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar |
title_short | Open-source security operations center (SOC) |
title_sort | open source security operations center soc a complete guide to establishing managing and maintaining a modern soc |
title_sub | a complete guide to establishing, managing, and maintaining a modern SOC |
topic | Cyberinfrastructure Security measures Computer networks Security measures Cyberterrorism Prevention Computer security Management Computer security Open source software Sécurité informatique ; Gestion Sécurité informatique Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures |
topic_facet | Cyberinfrastructure Security measures Computer networks Security measures Cyberterrorism Prevention Computer security Management Computer security Open source software Sécurité informatique ; Gestion Sécurité informatique Logiciels libres Réseaux d'ordinateurs ; Sécurité ; Mesures |
work_keys_str_mv | AT bastaalfred opensourcesecurityoperationscentersocacompleteguidetoestablishingmanagingandmaintainingamodernsoc AT bastanadine opensourcesecurityoperationscentersocacompleteguidetoestablishingmanagingandmaintainingamodernsoc AT anwarwaqar opensourcesecurityoperationscentersocacompleteguidetoestablishingmanagingandmaintainingamodernsoc AT essarmohammadilyas opensourcesecurityoperationscentersocacompleteguidetoestablishingmanagingandmaintainingamodernsoc AT johnwileysons opensourcesecurityoperationscentersocacompleteguidetoestablishingmanagingandmaintainingamodernsoc |