Bookbot

Security Log Management

Valoración del libro

2,5(4)Añadir reseña

Parámetros

  • 350 páginas
  • 13 horas de lectura

Más información sobre el libro

This book instructs IT professionals on how to analyze, manage, and automate security log files to create useful, repeatable insights that enhance network efficiency and security, primarily using open source tools. It starts by identifying the "Top 10" security logs that should be regularly analyzed, covering key areas such as the most active workstations and primary targets of IDS alerts. The relevance of this information is then discussed. The book also explains how to use open source reporting tools like Tcpdstats to automate the correlation of log files from various network devices with the "Top 10" list, enabling IT professionals to quickly identify critical vulnerabilities or significant network performance issues. All scripts featured in the book are available for download from the Syngress Solutions website. Nearly every operating system, firewall, router, switch, intrusion detection system, mail server, web server, and database generates log files, making log analysis a common task for system administrators and security professionals. This resource provides cost-effective, open source solutions for evaluating network performance and security, with numerous working scripts and tools that can save administrators countless hours by automating both simple and complex log analysis tasks.

Compra de libros

Security Log Management, Mark Burnett

Idioma
Publicado en
2006
product-detail.submit-box.info.binding
(Tapa blanda)
Te avisaremos por correo electrónico en cuanto lo localicemos.

Métodos de pago

2,5
Más o menos
4 Valoraciones

Nos falta tu reseña aquí