Security log management : identifying patterns in the chaos /
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Babbin, Jacob |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Security log management : identifying patterns in the chaos /
por: Babbin, Jacob
Publicado: (2006) -
Security log management : identifying patterns in the chaos /
por: Babbin, Jacob
Publicado: (2006) -
Multicast and group security /
por: Hardjono, Thomas
Publicado: (2003) -
How to cheat at VoIP security /
por: Porter, Thomas
Publicado: (2011) -
Why cyber security is a socio-technical challenge : new concepts and practical measures to enhance detection /
Publicado: (2016)