EUR 55,58
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 54,75
Währung umrechnenAnzahl: 15 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Verlag: Addison-Wesley Professional, 2021
ISBN 10: 0135619858 ISBN 13: 9780135619858
Sprache: Englisch
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 54,77
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Addison-Wesley Professional, 2021
ISBN 10: 0135619858 ISBN 13: 9780135619858
Sprache: Englisch
Anbieter: Kennys Bookstore, Olney, MD, USA
EUR 77,43
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: New. 2021. 1st Edition. Paperback. . . . . . Books ship from the US and Ireland.
Verlag: Addison-Wesley Professional, 2021
ISBN 10: 0135619858 ISBN 13: 9780135619858
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 65,02
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 752 pages. 9.00x7.00x1.50 inches. In Stock.
Verlag: LAP Lambert Academic Publishing|Addison-Wesley, 2021
ISBN 10: 0135619858 ISBN 13: 9780135619858
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 45,98
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: New. This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to de.
Verlag: Addison-Wesley Professional, 2021
ISBN 10: 0135619858 ISBN 13: 9780135619858
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 82,90
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 752 pages. 9.00x7.00x1.50 inches. In Stock.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 55,63
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. Writing for security and network professionals, managers, and other stakeholders, the authors cover:Pearson, St.-Martin-Straße 82, 81541 München 752 pp. Englisch.
EUR 57,32
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.This guide will be indispensable for everyone responsible for delivering security services managers and cybersecurity professionals alike.Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technologyIdentify, recruit, interview, onboard, and grow an outstanding SOC teamThoughtfully decide what to outsource and what to insourceCollect, centralize, and use both internal data and external threat intelligenceQuickly and efficiently hunt threats, respond to incidents, and investigate artifactsReduce future risk by improving incident recovery and vulnerability managementApply orchestration and automation effectively, without just throwing money at themPosition yourself today for emerging SOC technologies.