Security log management identifying patterns in the chaos

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Babbin, Jacob (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, MA Syngress c2006
Schlagworte:
Online-Zugang:DE-1046
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042307664
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2006 xx o|||| 00||| eng d
020 |a 1597490423  |9 1-59749-042-3 
020 |a 9781597490429  |9 978-1-59749-042-9 
035 |a (OCoLC)64274794 
035 |a (DE-599)BVBBV042307664 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
100 1 |a Babbin, Jacob  |e Verfasser  |4 aut 
245 1 0 |a Security log management  |b identifying patterns in the chaos  |c Jacob Babbin ... [et al.] 
264 1 |a Rockland, MA  |b Syngress  |c c2006 
300 |a 1 Online-Ressource (xviii, 333 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks 
650 7 |a Computer networks / Security measures  |2 fast 
650 4 |a Computer networks  |x Security measures 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597490429  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
940 1 |q FLA_PDA_ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027744656 
966 e |u http://www.sciencedirect.com/science/book/9781597490429  |l DE-1046  |p ZDB-33-ESD  |q FAW_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819294013292806144
any_adam_object
author Babbin, Jacob
author_facet Babbin, Jacob
author_role aut
author_sort Babbin, Jacob
author_variant j b jb
building Verbundindex
bvnumber BV042307664
collection ZDB-33-ESD
ctrlnum (OCoLC)64274794
(DE-599)BVBBV042307664
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03180nam a2200373zc 4500</leader><controlfield tag="001">BV042307664</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2006 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490423</subfield><subfield code="9">1-59749-042-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490429</subfield><subfield code="9">978-1-59749-042-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64274794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307664</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Babbin, Jacob</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security log management</subfield><subfield code="b">identifying patterns in the chaos</subfield><subfield code="c">Jacob Babbin ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 333 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490429</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744656</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490429</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV042307664
illustrated Not Illustrated
indexdate 2024-12-24T04:19:34Z
institution BVB
isbn 1597490423
9781597490429
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027744656
oclc_num 64274794
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xviii, 333 p.)
psigel ZDB-33-ESD
FLA_PDA_ESD
ZDB-33-ESD FAW_PDA_ESD
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher Syngress
record_format marc
spelling Babbin, Jacob Verfasser aut
Security log management identifying patterns in the chaos Jacob Babbin ... [et al.]
Rockland, MA Syngress c2006
1 Online-Ressource (xviii, 333 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
Computer networks / Security measures fast
Computer networks Security measures
http://www.sciencedirect.com/science/book/9781597490429 Verlag Volltext
spellingShingle Babbin, Jacob
Security log management identifying patterns in the chaos
Computer networks / Security measures fast
Computer networks Security measures
title Security log management identifying patterns in the chaos
title_auth Security log management identifying patterns in the chaos
title_exact_search Security log management identifying patterns in the chaos
title_full Security log management identifying patterns in the chaos Jacob Babbin ... [et al.]
title_fullStr Security log management identifying patterns in the chaos Jacob Babbin ... [et al.]
title_full_unstemmed Security log management identifying patterns in the chaos Jacob Babbin ... [et al.]
title_short Security log management
title_sort security log management identifying patterns in the chaos
title_sub identifying patterns in the chaos
topic Computer networks / Security measures fast
Computer networks Security measures
topic_facet Computer networks / Security measures
Computer networks Security measures
url http://www.sciencedirect.com/science/book/9781597490429
work_keys_str_mv AT babbinjacob securitylogmanagementidentifyingpatternsinthechaos