Logging and Log Management
22
%
904 Kč 1 156 Kč
Odesíláme do 1 až 2 týdnů
Sleva až 70% u třetiny knih
Effectively analyzing large volumes of diverse logs can pose many challenges. This title helps to simplify this complex process using practical guidance and real-world examples. It includes information on different uses for logs - from system operations to regulatory compliance.
Autor: | Schmidt, Kevin; Chuvakin, Anton |
Nakladatel: | Syngress Media,U.S. |
ISBN: | 9781597496353 |
Rok vydání: | 2012 |
Jazyk : | Angličtina |
Vazba: | Paperback |
Počet stran: | 460 |
Mohlo by se vám také líbit..
-
The Basics of Cyber Warfare
Winterfeld, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity
-
CISSP Study Guide
Conrad, Eric
-
Security Risk Management
Evans V., DooleyJ., Wheeler A.
-
SQL Injection Attacks and Defense
Clarke-Salt, Justin
-
The Basics of Digital Forensics
Sammons, John
-
Breaking into Information Security
More, Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIAC-GCIH, GIAC-GSLC)); Stieber, Anthony J. (has over
-
Practical Deployment of Cisco Identi...
Richter, Mandy
-
Threat Forecasting
Pirc, John (Director, Security Solutions, Forsythe Technology and Co-Founder & Advisor, Bricata, LLC); DeSanto, David (D
-
Industrial Network Security
Knapp, Eric D. (Director of Critical Infrastructure Markets for NitroSecurity); Samani, Raj (VP, CTO for McAfee EMEA; CL
-
Automating Open Source Intelligence
Robert A. Slayton
-
Violent Python
O'Connor, TJ
-
Keys to the Kingdom
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
Information Security Risk Assessment...
Talabis, Mark
-
Google Hacking for Penetration Testers
Long, Johnny (Security Researcher); Gardner, Bill (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall Univers
-
Practical Lock Picking
Ollam, Deviant (Member of the Board of Directors of the U.S. division of TOOOL, The Open Organisation Of Lockpickers and
-
A Guide to Kernel Exploitation
Perla, Enrico