Security information and event management (SIEM) implementation / (Record no. 7393)

000 -LEADER
fixed length control field 01610nam a2200325 a 4500
001 - CONTROL NUMBER
control field VNU140137157
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200924215532.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120316s2011 xxc|||||||||||||||||eng||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071701095
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071701099
040 ## - CATALOGING SOURCE
Original cataloging agency ISVNU
Language of cataloging vie
Transcribing agency ISVNU
Description conventions aaacr2
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
044 ## - COUNTRY OF PUBLISHING/PRODUCING ENTITY CODE
MARC country code xxc
082 74 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) 005.8
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) SEC 2011
245 00 - TITLE STATEMENT
Title Security information and event management (SIEM) implementation /
Statement of responsibility, etc. David R. Miller ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. 2011
300 ## - PHYSICAL DESCRIPTION
Extent xxxiv, 430 p. :
Other physical details ill. ;
Dimensions 24 cm.
520 ## - SUMMARY, ETC.
Summary, etc. Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM capabilities for business intelligence. Real-world case studies are included in this comprehensive resource.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application logging (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
Form subdivision Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term An toàn dữ liệu
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Lập trình
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Máy tính
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Miller, David,
Dates associated with a name 1959
912 ## -
-- Nguyễn Thị Dung
913 ## -
-- Khoa Quốc tế 01
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Sách tham khảo
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
N/A N/A   N/A N/A Thư viện Trường Quốc tế - Cơ sở Hacinco Thư viện Trường Quốc tế - Cơ sở Hacinco Kho STK tiếng Anh 18/09/2014 1   005.8 SEC 2011 E-B7/06949 23/09/2019 23/10/2019 Sách tham khảo