نام کتاب
Logging and Log Management

The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Anton A. Chuvakin, Kevin J. Schmidt, Christopher Phillips

Paperback463 Pages
PublisherSyngress
Edition1
LanguageEnglish
Year2013
ISBN9781597496353
796
A4828
انتخاب نوع چاپ:
جلد سخت
822,000ت
0
جلد نرم
762,000ت
0
طلق پاپکو و فنر
772,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:A4
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Logging

#Log

#Management

توضیحات

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity.


The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis.


This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.


Table of Contents

1 Logs, Trees, Forest: The Big Picture

2 What is a Log?

3 Log Data Sources

4 Log Storage Technologies

5 syslog-ng Case Study

6 Covert Logging

7 Analysis Goals, Planning, and Preparation: What Are We Looking for?

8 Simple Analysis Techniques

9 Filtering, Normalization, and Correlation

10 Statistical Analysis

11 Log Data Mining

12 Reporting and Summarization

13 Visualizing Log Data

14 Logging Laws and Logging Mistakes

15 Tools for Log Analysis and Collection

16 Log Management Procedures: Log Review, Response, and Escalation

17 Attacks Against Logging Systems

18 Logging for Programmers

19 Logs and Compliance

20 Planning Your Own Log Analysis System

21 Cloud Logging

22 Log Standards and Future Trends


About the Authors

Dr. Anton Chuvakin is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of the books "Security Warrior" and "PCI Compliance" and has contributed to many others, while also publishing dozens of papers on log management, correlation, data analysis, PCI DSS, and security management. His blog (http://www.securitywarrior.org) is one of the most popular in the industry. Additionaly, Anton teaches classes and presents at many security conferences across the world and he works on emerging security standards and serves on the advisory boards of

several security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Anton earned his Ph.D. from Stony Brook University.


Kevin J. Schmidt is a senior manager at Dell SecureWorks, Inc., an industry leading MSSP, which is part of Dell. He is responsible for the design and development of a major part of the company’s SIEM platform. This includes data acquisition, correlation and analysis of log data.


Prior to SecureWorks, Kevin worked for Reflex Security where he worked on an IPS engine and anti-virus software. And prior to this he was a lead developer and architect at GuardedNet, Inc.,which built one of the industry’s first SIEM platforms. Kevin is also a commissioned officer in the United States Navy Reserve (USNR).


Kevin has over 19 years of experience in software development and design, 11 of which have been in the network security space. He holds a B.Sc. in computer science.


Christopher Phillips is a manager and senior software developer at Dell SecureWorks, Inc. He is responsible for the design and development of the company's Threat Intelligence service platform. He also has responsibility for a team involved in integrating log and event information from many third party providers for customers to have their information analyzed by the Dell SecureWorks systems and security professionals. Prior to Dell SecureWorks, Christopher has worked for McKesson and Allscripts where he worked with clients on HIPAA compliance and security and integrating healthcare systems. Christopher has over 18 years of experience in software development and design. He holds a Bachelors of Science in Computer Science and an MBA.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
More Books
1,482
Up and Running with Affinity Designer
665,000 تومان
More Books
934
Microinteractions
383,000 تومان
More Books
888
Systems Analysis and Design
1,208,000 تومان
More Books
881
Simplifying Service Management with Consul
418,000 تومان
More Books
1,805
Odoo 15 Development Essentials
923,000 تومان
More Books
890
Codeless Time Series Analysis with KNIME
592,000 تومان
More Books
471
Systems Analysis and Design
766,000 تومان
More Books
904
Driverless
517,000 تومان
More Books
1,431
Think Like a Programmer
446,000 تومان
More Books
943
Logging in Action
594,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©