Cargando…

Security log management : identifying patterns in the chaos /

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Babbin, Jacob
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, �2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm64274794
003 OCoLC
005 20231117015030.0
006 m o d
007 cr cnu---unuuu
008 060224s2006 maua o 001 0 eng d
010 |z  2006355064 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d TUU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d NLGGC  |d OCLCQ  |d N15  |d E7B  |d YDXCP  |d NTG  |d DKDLA  |d ZCU  |d U5D  |d B24X7  |d OPELS  |d OKU  |d FVL  |d DEBSZ  |d MERUC  |d IDEBK  |d AU@  |d OCLCQ  |d COO  |d AZK  |d JBG  |d LOA  |d AGLDB  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d WY@  |d U3W  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d WCO  |d OCLCQ  |d VTS  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d N$T  |d WYU  |d OCLCQ  |d A6Q  |d OCLCQ  |d LEAUB  |d M8D  |d UKCRE  |d OCLCO  |d OCLCQ  |d INARC 
019 |a 67290245  |a 84145610  |a 162597457  |a 181421127  |a 437163441  |a 473722873  |a 475321970  |a 507548149  |a 606030999  |a 647464666  |a 722429489  |a 728037597  |a 780972090  |a 888477724  |a 961586337  |a 962649503  |a 966232129  |a 988452195  |a 991942086  |a 992022292  |a 1035697110  |a 1037519438  |a 1037693594  |a 1038632406  |a 1045536758  |a 1055401113  |a 1058102874  |a 1063991286  |a 1076307480  |a 1081293741  |a 1153563028  |a 1202567392  |a 1228551084  |a 1240508121  |a 1345652304 
020 |a 1423754174  |q (electronic bk.) 
020 |a 9781423754176  |q (electronic bk.) 
020 |a 0080489702 
020 |a 9780080489704 
020 |a 9781597490429 
020 |a 1597490423 
035 |a (OCoLC)64274794  |z (OCoLC)67290245  |z (OCoLC)84145610  |z (OCoLC)162597457  |z (OCoLC)181421127  |z (OCoLC)437163441  |z (OCoLC)473722873  |z (OCoLC)475321970  |z (OCoLC)507548149  |z (OCoLC)606030999  |z (OCoLC)647464666  |z (OCoLC)722429489  |z (OCoLC)728037597  |z (OCoLC)780972090  |z (OCoLC)888477724  |z (OCoLC)961586337  |z (OCoLC)962649503  |z (OCoLC)966232129  |z (OCoLC)988452195  |z (OCoLC)991942086  |z (OCoLC)992022292  |z (OCoLC)1035697110  |z (OCoLC)1037519438  |z (OCoLC)1037693594  |z (OCoLC)1038632406  |z (OCoLC)1045536758  |z (OCoLC)1055401113  |z (OCoLC)1058102874  |z (OCoLC)1063991286  |z (OCoLC)1076307480  |z (OCoLC)1081293741  |z (OCoLC)1153563028  |z (OCoLC)1202567392  |z (OCoLC)1228551084  |z (OCoLC)1240508121  |z (OCoLC)1345652304 
050 4 |a TK5105.59  |b .B333 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UACD  |2 bicssc 
082 0 4 |a 005.8  |2 22 
100 1 |a Babbin, Jacob. 
245 1 0 |a Security log management :  |b identifying patterns in the chaos /  |c Jacob Babbin [and others]. 
260 |a Rockland, MA :  |b Syngress,  |c �2006. 
300 |a 1 online resource (xviii, 333 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Log analysis : overall issues -- IDS reporting -- Firewall reporting -- Systems and network device reporting -- Creating a reporting infrastructure -- Scalable enterprise Solutions (ESM deployments) -- Managing log files with Microsoft Log Parser -- Investigating intrusions with Microsoft Log Parser -- Managing Snort alerts with Microsoft Log Parser. 
520 |a This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks. 
504 |a Includes index. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Babbin, Jacob.  |t Security log management.  |d Rockland, MA : Syngress, �2006  |z 1597490423  |w (OCoLC)63807023 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597490429  |z Texto completo