|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
11273906 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170523s2017 enk o 001 0 eng d |
005 |
20240715212419.6 |
019 |
|
|
|a 987809552
|a 999553363
|a 1005105755
|a 1005343981
|
020 |
|
|
|a 9780128036822
|q (electronic bk.)
|
020 |
|
|
|a 0128036826
|q (electronic bk.)
|
020 |
|
|
|z 9780128036570
|q (print)
|
020 |
|
|
|z 0128036575
|
035 |
|
|
|a (OCoLC)987790896
|z (OCoLC)987809552
|z (OCoLC)999553363
|z (OCoLC)1005105755
|z (OCoLC)1005343981
|
035 |
|
9 |
|a (OCLCCM-CC)987790896
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IDEBK
|d EBLCP
|d UIU
|d OPELS
|d N$T
|d CNCGM
|d OCLCF
|d MERER
|d YDX
|d NLE
|d OCLCQ
|d OTZ
|d D6H
|
049 |
|
|
|a MAIN
|
050 |
|
4 |
|a TK5105.59
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
100 |
1 |
|
|a Jarpey, Gregory,
|e author.
|
245 |
1 |
0 |
|a Security operations center guidebook :
|b a practical guide for a successful SOC /
|c Gregory Jarpey, R. Scott McCoy.
|
264 |
|
1 |
|a Kidlington, Oxford, United Kingdom :
|b Butterworth-Heinemann is an imprint of Elsevier,
|c 2017.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/c
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/cr
|
505 |
0 |
|
|a Front Cover; Security Operations Center Guidebook; Copyright Page; Dedication; Contents; Introduction; A Rocky Start; I. Developing Your Security Operations Center; 1 What is a Security Operations Center?; Third Party; Hybrid; Dedicated; Historical Lessons; 2 Needs Assessment; Risk Assessment; Types of Companies; A Single Suite in a Larger Office Complex That Operates Primarily During Business Hours; A Single Location Dedicated to Only Your Company, with no Other Tenants; A Single Campus with Multiple Buildings; Multiple Locations Located in the Same Metro Area
|
505 |
8 |
|
|a Multiple Locations Spread across a Single Country and Multiple Locations Spread across Several CountriesAdditional Considerations; Historical Lessons; Vulnerable Adults; Modest Beginnings; 3 Business Case; Example; Historical Lessons; First Attempt; A Unique Approach; 4 Building Your SOC; Workstations; Historical Lessons; 5 Staffing Options; Training; Career Progression; Retention; Historical Lessons; II. Operations; 6 Responsibilities and Duties; Introduction; Welcome to the SOC-You Have an Important Role; Mission Statement; SCO Job Description; Sample SCO Job Description; Position Summary
|
505 |
8 |
|
|a Duties and ResponsibilitiesQualifications; Physical Demands/Environmental Conditions; Hiring and Interviewing Your SCO Candidate; Sample Interview Questions for a SCO; Staffing and Schedule; Sample Three-Week Rotation; Supervisory Authority; Staff Responsibility; Historical Lessons; 7 Post Orders and Procedures; Introduction; Setting Up Your Post Orders; Create a Shared Email Address for Security Inquiries and Requests; Performance of Duties; Example Post Order Table of Contents Setup and Their Purpose; Chapter One-Introduction; Chapter Two-Duties; Chapter Three-Call Center Procedures
|
505 |
8 |
|
|a Chapter Four-Emergency ProceduresChapter Five-Standards and Policies; Chapter Six-Equipment Procedures; Chapter Seven-Post Order Changes and Updates; Chapter Eight-Appendices; Site Procedures; Section One-Site Info; Section Two-Intrusion Alarm Response; Section Three-Fire Alarm Response; Section Four-Mechanical Alarms; Section Five-Contact Lists; Section Six-Special Instructions; Historical Lessons; 8 Training Programs; Introduction; Getting Started; New Hire Training Schedule; Individual Training Checklist; Monthly, Quarterly, and Annual Training; Historical Lessons
|
505 |
8 |
|
|a 9 Enterprise Access ControlIntroduction; Setting Up Your Physical Access Control System; Operator Permissions; Card Access Programming and Control; Setting up and Controlling Your Restricted Areas Access; Creating a Restricted Area; Access Approvals, Denials, and Removals; Access Control Matrix; Site Access Control; Follow These Steps; System Status Checks; Troubleshooting; Historical Lessons; 10 Alarm Monitoring; Introduction; Physical Access Control System (PACS) or Intrusion Detection System (IDS) Alarms; Alarm Instructions; Receiving Alarms
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed June 5, 2017).
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh94001277
|
650 |
|
0 |
|a Computer networks
|x Access control.
|0 http://id.loc.gov/authorities/subjects/sh2007008424
|
650 |
|
7 |
|a COMPUTERS / Security / Networking
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 http://id.worldcat.org/fast/fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 http://id.worldcat.org/fast/fst00872341
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a McCoy, R. Scott,
|e author.
|
776 |
0 |
8 |
|c Original
|z 0128036575
|z 9780128036570
|w (OCoLC)962889202
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a oclccm
|
999 |
f |
f |
|i d73c2d3e-d39f-51dd-8663-f3ab17f11daf
|s a29951f9-f38f-5887-ae5a-2099bbf8ec8e
|
928 |
|
|
|t Library of Congress classification
|a TK5105.59
|l Online
|c UC-FullText
|u https://www.sciencedirect.com/science/book/9780128036570
|z Elsevier
|g ebooks
|i 10980283
|