Absolutely Australia's Lowest Prices

Turn your Clutter Into Cash with SmartSell.TM Book a Courier Pickup Today!

Logging and Log Management
By

Rating

Product Description
Product Details

Promotional Information

A comprehensive guide to log management written by the experts who wrote the rules.

Table of Contents

Chapter 1 Logs, Trees, Forest: the Big Picture Chapter 2 What is a Log? Chapter 3 Generating Logs Chapter 4 Log Storage Technologies Chapter 5 Case study: syslog-ng Chapter 6 Covert logging Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for? Chapter 8 Simple Analysis Techniques Chapter 9 Filtering, Matching and Correlation Chapter 10 Statistical Analysis Chapter 11 Log Data Mining Chapter 12 Reporting and Summarization Chapter 13 Visualizing Log Data Chapter 14 Logging Laws and Logging Mistakes Chapter 15 Tools for Log Analysis and Collection Chapter 16 Log Management Procedures: Escalation, Response Chapter 17 Attacks against logging systems Chapter 18 Logging for Programmers Chapter 19 Logs and Compliance Chapter 20 Planning Your Own Log Analysis System Chapter 21 Cloud Logging Chapter 22 Log Standard and Future Trends

About the Author

Dr. Anton Chuvakin is a recognized security expert in the field of logmanagement and PCI DSS compliance. He is an author of the books "Security Warrior" and "PCICompliance" and has contributed to many others, while also publishing dozens of papers on log management, correlation, data analysis, PCI DSS, and security management. His blog(http://www.securitywarrior.org) is one of the most popular in the industry.Additionaly, Anton teaches classes and presents at many security conferences across the worldand he works on emerging security standards and serves on the advisory boards ofseveral security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations.Anton earned his Ph.D. from Stony Brook University. Kevin J. Schmidt is a senior manager at Dell SecureWorks, Inc., an industry leading MSSP, which is part of Dell. He is responsible for the design and development of a major part of the company's SIEM platform. This includes data acquisition, correlation and analysis of log data.Prior to SecureWorks, Kevin worked for Reflex Security where he worked on an IPS engine and anti-virus software. And prior to this he was a lead developer and architect at GuardedNet, Inc.,which built one of the industry's first SIEM platforms. Kevin is also a commissioned officer in the United States Navy Reserve (USNR). Kevin has over 19 years of experience in software development and design, 11 of which have been in the network security space. He holds a B.Sc. in computer science. Christopher Phillips is a manager and senior software developer at Dell SecureWorks, Inc. He is responsible for the design and development of the company's Threat Intelligence service platform. He also has responsibility for a team involved in integrating log and event information from many third party providers for customers to have their information analyzed by the Dell SecureWorks systems and security professionals. Prior to Dell SecureWorks, Christopher has worked for McKesson and Allscripts where he worked with clients on HIPAA compliance and security and integrating healthcare systems. Christopher has over 18 years of experience in software development and design. He holds a Bachelors of Science in Computer Science and an MBA.

Reviews

"The authors provide a way to simplify the complex process of analyzing large quantities of varied logs. The log management and log analysis approaches they recommend are addressed in detail."--Reference and Research Book News, August 2013 ".Anton Chuvakin and his co-authors Kevin Schmidt and Christopher Phillips bring significant real-world experience to the reader and an important book on the topic...For those that want to find the gold in their logs.[it] is a great resource that shows how to maximize the gold that often lays hidden in your large stores of log data."--RSA Conference, December 2012

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top