000 -LEADER |
fixed length control field |
01610nam a2200325 a 4500 |
001 - CONTROL NUMBER |
control field |
VNU140137157 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200924215532.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120316s2011 xxc|||||||||||||||||eng|| |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071701095 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071701099 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
ISVNU |
Language of cataloging |
vie |
Transcribing agency |
ISVNU |
Description conventions |
aaacr2 |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
044 ## - COUNTRY OF PUBLISHING/PRODUCING ENTITY CODE |
MARC country code |
xxc |
082 74 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
005.8 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
SEC 2011 |
245 00 - TITLE STATEMENT |
Title |
Security information and event management (SIEM) implementation / |
Statement of responsibility, etc. |
David R. Miller ... [et al.]. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw-Hill, |
Date of publication, distribution, etc. |
2011 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiv, 430 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Application logging (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
Form subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computers |
General subdivision |
Access control |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
An toàn dữ liệu |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Lập trình |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Máy tính |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Miller, David, |
Dates associated with a name |
1959 |
912 ## - |
-- |
Nguyễn Thị Dung |
913 ## - |
-- |
Khoa Quốc tế 01 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Sách tham khảo |