Security Information and Event Management Best Selling Books

2016 SIEM Buyers Guide from Solutions ReviewSolutions Review has compiled a cross-section of the best selling books on the subject of Security Information and Event Management (SIEM). Below you will find a library of books from recognized experts in the field of cyber security covering topics ranging from SIEM and IT Auditing to Network Security Monitoring (NSM) and Log Management.

Security Information and Event Management (SIEM) Implementation

“Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts.”
Learn more

Effective Computer Security and Risk Management Strategies

“This practical resource leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.”
Learn More

IT Auditing Using Controls to Protect Information Assets

“This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, checklists and valuable templates.”
Learn More

CISSP Certified Information Systems Security Professional Study Guide

“Covers 100% of exam 2015 CISSP (ISC)2 candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more.”
Learn More

The Computer Incident Response Planning Handbook

“Shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans.”
Learn More

Data-Driven Security: Analysis, Visualization and Dashboards

“Everything in this book will have practical application for information security. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks.”
Learn More

The Practice of Network Security Monitoring

“There’s no foolproof way to keep attackers out of your network. But when they get in, you’ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them.”
Learn More

Security Metrics – A Beginner’s Guide (1st Edition)

“This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, resourcing and cloud-based security metrics.”
Learn More

Hacking Exposed 7: Network Security Secrets and Solutions

“Bolster your system’s security and defeat the tools and tactics of cyber-criminals with advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies.”
Learn More

Network Security Through Data Analysis: Building Situational Awareness

“Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. Ideal for network administrators and operational security analysts.
Learn More

Applied Network Security Monitoring: Collection, Detection & Analysis

“Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.”
Learn More

Blue Team Handbook: Incident Response Edition

“The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The book is peppered with practical real life techniques from the authors extensive career working in academia and a corporate setting.”
Learn More