Security Log Management : Identifying Patterns in the Chaos.
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that...
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Elsevier Science & Technology
2006.
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Network security with NetFlow and IPFIX : big data analytics for information security /
por: Santos, Omar
Publicado: (2016) -
Security log management : identifying patterns in the chaos /
por: Babbin, Jacob
Publicado: (2006) -
Security log management : identifying patterns in the chaos /
por: Babbin, Jacob
Publicado: (2006) -
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT /
por: Seagren, Eric
Publicado: (2006) -
Router security strategies : securing IP network traffic planes /
por: Schudel, Gregg
Publicado: (2008)