Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Autor Kevin Schmidt, Chris Phillips, Anton Chuvakinen Limba Engleză Paperback – 30 dec 2012
- Comprehensive coverage of log management including analysis, visualization, reporting and more
- Includes information on different uses for logs -- from system operations to regulatory compliance
- Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response
- Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
Preț: 343.58 lei
Preț vechi: 429.47 lei
-20% Nou
Puncte Express: 515
Preț estimativ în valută:
65.75€ • 68.30$ • 54.62£
65.75€ • 68.30$ • 54.62£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597496353
ISBN-10: 1597496359
Pagini: 460
Ilustrații: 20 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.84 kg
Editura: Elsevier
ISBN-10: 1597496359
Pagini: 460
Ilustrații: 20 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.84 kg
Editura: Elsevier
Public țintă
Computer Security staff and program managers; system, network, and application administrators; computer security incident response teams; and others who are responsible for performing duties related to computer security log management.Cuprins
Chapter 1 Logs, Trees, Forest: the Big Picture
Chapter 2 What is a Log?
Chapter 3 Generating Logs
Chapter 4 Log Storage Technologies
Chapter 5 Case study: syslog-ng
Chapter 6 Covert logging
Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?
Chapter 8 Simple Analysis Techniques
Chapter 9 Filtering, Matching and Correlation
Chapter 10 Statistical Analysis
Chapter 11 Log Data Mining
Chapter 12 Reporting and Summarization
Chapter 13 Visualizing Log Data
Chapter 14 Logging Laws and Logging Mistakes
Chapter 15 Tools for Log Analysis and Collection
Chapter 16 Log Management Procedures: Escalation, Response
Chapter 17 Attacks against logging systems
Chapter 18 Logging for Programmers
Chapter 19 Logs and Compliance
Chapter 20 Planning Your Own Log Analysis System
Chapter 21 Cloud Logging
Chapter 22 Log Standard and Future Trends
Chapter 2 What is a Log?
Chapter 3 Generating Logs
Chapter 4 Log Storage Technologies
Chapter 5 Case study: syslog-ng
Chapter 6 Covert logging
Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?
Chapter 8 Simple Analysis Techniques
Chapter 9 Filtering, Matching and Correlation
Chapter 10 Statistical Analysis
Chapter 11 Log Data Mining
Chapter 12 Reporting and Summarization
Chapter 13 Visualizing Log Data
Chapter 14 Logging Laws and Logging Mistakes
Chapter 15 Tools for Log Analysis and Collection
Chapter 16 Log Management Procedures: Escalation, Response
Chapter 17 Attacks against logging systems
Chapter 18 Logging for Programmers
Chapter 19 Logs and Compliance
Chapter 20 Planning Your Own Log Analysis System
Chapter 21 Cloud Logging
Chapter 22 Log Standard and Future Trends
Recenzii
"The authors provide a way to simplify the complex process of analyzing large quantities of varied logs. The log management and log analysis approaches they recommend are addressed in detail." --Reference and Research Book News, August 2013
"…Anton Chuvakin and his co-authors Kevin Schmidt and Christopher Phillips bring significant real-world experience to the reader and an important book on the topic....For those that want to find the gold in their logs…[it] is a great resource that shows how to maximize the gold that often lays hidden in your large stores of log data." --RSA Conference, December 2012
"…Anton Chuvakin and his co-authors Kevin Schmidt and Christopher Phillips bring significant real-world experience to the reader and an important book on the topic....For those that want to find the gold in their logs…[it] is a great resource that shows how to maximize the gold that often lays hidden in your large stores of log data." --RSA Conference, December 2012
Notă biografică
Kevin J. Schmidt is a senior manager at Dell SecureWorks, Inc., an industry leading MSSP, which is part of Dell. He is responsible for the design and development of a major part of the company¿s SIEM platform. This includes data acquisition, correlation and analysis of log data.
Prior to SecureWorks, Kevin worked for Reflex Security where he worked on an IPS engine and anti-virus software. And prior to this he was a lead developer and architect at GuardedNet, Inc.,which built one of the industry¿s first SIEM platforms. Kevin is also a commissioned officer in the United States Navy Reserve (USNR).
Kevin has over 19 years of experience in software development and design, 11 of which have been in the network security space. He holds a B.Sc. in computer science.