Cargando…

Security log management : identifying patterns in the chaos /

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Babbin, Jacob
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm64274794
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 060224s2006 maua o 001 0 eng d
010 |z  2006355064 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d TUU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d NLGGC  |d OCLCQ  |d N15  |d E7B  |d YDXCP  |d NTG  |d DKDLA  |d ZCU  |d U5D  |d B24X7  |d OPELS  |d OKU  |d FVL  |d DEBSZ  |d MERUC  |d IDEBK  |d AU@  |d OCLCQ  |d COO  |d AZK  |d JBG  |d LOA  |d AGLDB  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d WY@  |d U3W  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d WCO  |d OCLCQ  |d VTS  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d N$T  |d WYU  |d OCLCQ  |d A6Q  |d OCLCQ  |d LEAUB  |d M8D  |d UKCRE  |d OCLCO  |d OCLCQ  |d INARC 
019 |a 67290245  |a 84145610  |a 162597457  |a 181421127  |a 437163441  |a 473722873  |a 475321970  |a 507548149  |a 606030999  |a 647464666  |a 722429489  |a 728037597  |a 780972090  |a 888477724  |a 961586337  |a 962649503  |a 966232129  |a 988452195  |a 991942086  |a 992022292  |a 1035697110  |a 1037519438  |a 1037693594  |a 1038632406  |a 1045536758  |a 1055401113  |a 1058102874  |a 1063991286  |a 1076307480  |a 1081293741  |a 1153563028  |a 1202567392  |a 1228551084  |a 1240508121  |a 1345652304 
020 |a 1423754174  |q (electronic bk.) 
020 |a 9781423754176  |q (electronic bk.) 
020 |a 0080489702 
020 |a 9780080489704 
020 |a 9781597490429 
020 |a 1597490423 
029 1 |a AU@  |b 000048761573 
029 1 |a AU@  |b 000051559077 
029 1 |a AU@  |b 000053224968 
029 1 |a AU@  |b 000053227880 
029 1 |a AU@  |b 000066767134 
029 1 |a CHBIS  |b 005831750 
029 1 |a CHNEW  |b 001004865 
029 1 |a CHVBK  |b 168557584 
029 1 |a DEBBG  |b BV042307664 
029 1 |a DEBBG  |b BV043165989 
029 1 |a DEBSZ  |b 405313233 
029 1 |a DEBSZ  |b 422285420 
029 1 |a DEBSZ  |b 430324081 
029 1 |a GBVCP  |b 801400325 
029 1 |a NZ1  |b 12033482 
035 |a (OCoLC)64274794  |z (OCoLC)67290245  |z (OCoLC)84145610  |z (OCoLC)162597457  |z (OCoLC)181421127  |z (OCoLC)437163441  |z (OCoLC)473722873  |z (OCoLC)475321970  |z (OCoLC)507548149  |z (OCoLC)606030999  |z (OCoLC)647464666  |z (OCoLC)722429489  |z (OCoLC)728037597  |z (OCoLC)780972090  |z (OCoLC)888477724  |z (OCoLC)961586337  |z (OCoLC)962649503  |z (OCoLC)966232129  |z (OCoLC)988452195  |z (OCoLC)991942086  |z (OCoLC)992022292  |z (OCoLC)1035697110  |z (OCoLC)1037519438  |z (OCoLC)1037693594  |z (OCoLC)1038632406  |z (OCoLC)1045536758  |z (OCoLC)1055401113  |z (OCoLC)1058102874  |z (OCoLC)1063991286  |z (OCoLC)1076307480  |z (OCoLC)1081293741  |z (OCoLC)1153563028  |z (OCoLC)1202567392  |z (OCoLC)1228551084  |z (OCoLC)1240508121  |z (OCoLC)1345652304 
037 |a 116458:116556  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .B333 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UACD  |2 bicssc 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Babbin, Jacob. 
245 1 0 |a Security log management :  |b identifying patterns in the chaos /  |c Jacob Babbin [and others]. 
260 |a Rockland, MA :  |b Syngress,  |c ©2006. 
300 |a 1 online resource (xviii, 333 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Log analysis : overall issues -- IDS reporting -- Firewall reporting -- Systems and network device reporting -- Creating a reporting infrastructure -- Scalable enterprise Solutions (ESM deployments) -- Managing log files with Microsoft Log Parser -- Investigating intrusions with Microsoft Log Parser -- Managing Snort alerts with Microsoft Log Parser. 
520 |a This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks. 
504 |a Includes index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Babbin, Jacob.  |t Security log management.  |d Rockland, MA : Syngress, ©2006  |z 1597490423  |w (OCoLC)63807023 
856 4 0 |u https://learning.oreilly.com/library/view/~/1597490423/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00005155 
938 |a ebrary  |b EBRY  |n ebr10110280 
938 |a EBSCOhost  |b EBSC  |n 149571 
938 |a YBP Library Services  |b YANK  |n 2627215 
938 |a YBP Library Services  |b YANK  |n 2730635 
938 |a YBP Library Services  |b YANK  |n 2395141 
938 |a Internet Archive  |b INAR  |n securitylogmanag0000babb 
994 |a 92  |b IZTAP