您的位置:首页 > 其它

Next SIEM

2014-05-12 21:29 204 查看
http://security.ctocio.com.cn/76/12715576.shtml
http://yepeng.blog.51cto.com/3101105/1155802/ http://www.lancope.com/eval-application/ http://www.darkreading.com/analytics/security-monitoring/more-improvements-to-siem-than-big-data/d/d-id/1139212? http://security.zdnet.com.cn/security_zone/2012/0412/2088066.shtml http://www.ibm.com/developerworks/opensource/library/os-bigdata/index.html http://www.logrhythm.com/siem-2.0/logrhythm-security-intelligence/siem-with-logrhythm.aspx#LiveAccordionContent3366332-la http://wuenlong.blog.51cto.com/4412161/d-1/p-2
当网络安全遇上大数据分析

http://www.zz2u.com/?p=223

http://www.shcert.org/news/49451f4f4cb448c3a055e00028c1f3fb.html

http://bbs.cisps.org/viewtopic.php?t=30175

http://wuenlong.blog.51cto.com/4412161/781579

http://domynews.blog.ithome.com.tw/category/1252/10007

http://sec.chinabyte.com/163/12672163_3.shtml
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: