feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV041631991
    Format: 1 Online-Ressource (XXX, 431 S.).
    ISBN: 978-1-59749-635-3 , 978-1-59749-636-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_9960073802602883
    Format: 1 online resource (386 p.)
    Edition: Fourth edition.
    ISBN: 0-12-801651-5
    Content: Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
    Note: Description based upon print version of record. , ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk"" , ""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" , ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" , ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" , ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" , ""Intrusion detection and prevention"" , English
    Additional Edition: ISBN 1-322-28687-6
    Additional Edition: ISBN 0-12-801579-9
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV041254711
    Format: XXX, 431 S. , graph. Darst. , 24 cm
    ISBN: 9781597496353 , 1597496359
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    edoccha_BV042305261
    Format: 1 Online-Ressource (XXX, 431 Seiten).
    ISBN: 978-1-59749-636-0 , 978-1-59749-635-3 , 1-59749-636-7
    Note: Includes bibliographical references and index. - Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on different uses for logs -- from system operations to regulatory complianceFeatures case Studies on syslog-ng and actual real-world situations where logs came in handy in incident responseProvides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-59749-635-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-59749-635-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edocfu_BV042305261
    Format: 1 Online-Ressource (XXX, 431 Seiten).
    ISBN: 978-1-59749-636-0 , 978-1-59749-635-3 , 1-59749-636-7
    Note: Includes bibliographical references and index. - Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on different uses for logs -- from system operations to regulatory complianceFeatures case Studies on syslog-ng and actual real-world situations where logs came in handy in incident responseProvides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-59749-635-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-59749-635-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edocfu_9960073802602883
    Format: 1 online resource (386 p.)
    Edition: Fourth edition.
    ISBN: 0-12-801651-5
    Content: Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
    Note: Description based upon print version of record. , ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk"" , ""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" , ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" , ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" , ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" , ""Intrusion detection and prevention"" , English
    Additional Edition: ISBN 1-322-28687-6
    Additional Edition: ISBN 0-12-801579-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948025791102882
    Format: 1 online resource (386 p.)
    Edition: Fourth edition.
    ISBN: 0-12-801651-5
    Content: Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
    Note: Description based upon print version of record. , ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk"" , ""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" , ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" , ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" , ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" , ""Intrusion detection and prevention"" , English
    Additional Edition: ISBN 1-322-28687-6
    Additional Edition: ISBN 0-12-801579-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edoccha_9960073802602883
    Format: 1 online resource (386 p.)
    Edition: Fourth edition.
    ISBN: 0-12-801651-5
    Content: Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. Thi
    Note: Description based upon print version of record. , ""Cover""; ""Title page""; ""Table of Contents""; ""Copyright""; ""Foreword""; ""Acknowledgments""; ""Chapter 1: About PCI DSS and this book""; ""Abstract""; ""Who should read this book?""; ""How to use the book in your daily job""; ""What this book is not""; ""Organization of the book""; ""Summary""; ""Chapter 2: Introduction to fraud, data theft, and related regulatory mandates""; ""Abstract""; ""Summary""; ""Chapter 3: Why is PCI here?""; ""Abstract""; ""What is PCI DSS and who must comply?""; ""PCI DSS in depth""; ""Quick overview of PCI requirements""; ""PCI DSS and risk"" , ""Benefits of compliance""""Case study""; ""Summary""; ""Chapter 4: Determining and reducing the PCI scope""; ""Abstract""; ""The basics of PCI DSS scoping""; ""The “gotchas� of PCI scope""; ""Scope reduction tips""; ""Planning your PCI project""; ""Case study""; ""Summary""; ""Chapter 5: Building and maintaining a secure network""; ""Abstract""; ""Which PCI DSS requirements are in this domain?""; ""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 6: Strong access controls""; ""Abstract"" , ""Which PCI DSS requirements are in this domain?""""What else can you do to be secure?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 7: Protecting cardholder data""; ""Abstract""; ""What is data protection and why is it needed?""; ""Requirements addressed in this chapter""; ""PCI requirement 3: Protect stored cardholder data""; ""Requirement 3 walk-through""; ""What else can you do to be secure?""; ""PCI requirement 4 walk-through""; ""Requirement 12 walk-through""; ""Appendix A of PCI DSS""; ""How to become compliant and secure"" , ""Common mistakes and pitfalls""""Case study""; ""Summary""; ""Chapter 8: Using wireless networking""; ""Abstract""; ""What is wireless network security?""; ""Where is wireless network security in PCI DSS?""; ""Why do we need wireless network security?""; ""Tools and best practices""; ""Common mistakes and pitfalls""; ""Case study""; ""Summary""; ""Chapter 9: Vulnerability management""; ""Abstract""; ""PCI DSS requirements covered""; ""Vulnerability management in PCI""; ""Requirement 5 walk-through""; ""Requirement 6 walk-through""; ""Requirement 11 walk-through"" , ""Internal vulnerability scanning""""Common PCI vulnerability management mistakes""; ""Case study""; ""Summary""; ""Chapter 10: Logging events and monitoring the cardholder data environment""; ""Abstract""; ""PCI requirements covered""; ""Why logging and monitoring in PCI DSS?""; ""Logging and monitoring in depth""; ""PCI relevance of logs""; ""Logging in PCI requirement 10""; ""Monitoring data and log for security issues""; ""Logging and monitoring in PCI�all other requirements""; ""PCI DSS logging policies and procedures""; ""Tools for logging in PCI""; ""Other monitoring tools"" , ""Intrusion detection and prevention"" , English
    Additional Edition: ISBN 1-322-28687-6
    Additional Edition: ISBN 0-12-801579-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_165316140X
    Format: Online Ressource (xviii, 348 p.) , ill.
    Edition: 2nd ed
    Edition: Online-Ausg.
    ISBN: 1597494992 , 9781597494991 , 9781597495394 , 1597495395
    Content: Foreword≤ -- Acknowledgments -- Chapter≤1: About PCI and This Book -- Chapter≤2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter≤11: Don't Fear the Assessor -- Chapter≤12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS
    Content: Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience
    Note: Includes index. - Includes bibliographical references and index. - Description based on print version record , Foreword€Acknowledgments -- Chapter€1: About PCI and This Book -- Chapter€2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter€11: Don't Fear the Assessor -- Chapter€12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS. , Foreword≤ -- Acknowledgments -- Chapter≤1: About PCI and This Book -- Chapter≤2: Introduction to Fraud, ID Theft, and Regulatory Mandates -- Chapter 3: Why Is PCI Here? -- Chapter 4: Building and Maintaining a Secure Network -- Chapter 5: Strong Access Controls -- Chapter 6: Protecting Cardholder Data -- Chapter 7: Using Wireless Networking -- Chapter 8: Vulnerability Management -- Chapter 9: Logging Events and Monitoring the Cardholder Data Environment -- Chapter 10: Managing a PCI DSS Project to Acheive Compliance -- Chapter≤11: Don't Fear the Assessor -- Chapter≤12: The Art of Compensating Control -- Chapter 13: You're Compliant, Now What? -- Chapter 14: PCI and Other Laws, Mandates, and Frameworks -- Chapter 15: Myths and Misconceptions of PCI DSS.
    Additional Edition: ISBN 1597494992
    Additional Edition: ISBN 1597495395
    Additional Edition: Erscheint auch als Druck-Ausgabe PCI compliance Burlington, MA : Syngress, c2010
    Language: English
    Keywords: Chipkarte ; Datensicherung ; Electronic books ; Electronic books ; Electronic books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9947368444402882
    Format: 1 online resource (463 p.)
    Edition: 1st edition
    ISBN: 1-283-85557-7 , 1-59749-636-7
    Content: Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on
    Note: Description based upon print version of record. , Half Title; Logging and Log Management; Copyright; Contents; Acknowledgments; About the Authors; About the Technical Editor; Foreword; Preface; 1 Logs, Trees, Forest: The Big Picture; Introduction; Log Data Basics; What Is Log Data?; How is Log Data Transmitted and Collected?; What is a Log Message?; The Logging Ecosystem; First Things First: Ask Questions, Have a Plan; Log Message Generation; Log Message Filtering and Normalization; Log Message Collection; Logging in the Cloud; Log Analysis; Log Message Long-Term Storage; A Look at Things to Come; Logs Are Underrated; Logs Can Be Useful , Resource ManagementIntrusion Detection; Troubleshooting; Forensics; Boring Audit, Fun Discovery; People, Process, Technology; Security Information and Event Management (SIEM); Summary; References; 2 What is a Log?; Introduction; Definitions; Logs? What logs?; Log Formats and Types; Log Syntax; Log Content; Criteria of Good Logging; Ideal Logging Scenario; Summary; References; 3 Log Data Sources; Introduction; Logging Sources; Syslog; Basic Logging with syslogd; Syslog Message Classification; The "Mark" Facility; Syslog Priority; Syslog.conf; The Mark Interval; Syslogd Output , The Syslog ProtocolSNMP; Managers and Agents; SNMP Traps and Notifications; SNMP Get; SNMP Set; Issues with SNMP as a Log Data Alternative; The Windows Event Log; Log Source Classification; Security-Related Host Logs; Operating System Logs; Network Daemon Logs; Application Logs; Security-Related Network Logs; Network Infrastructure Logs; Security Host Logs; Host Intrusion Detection and Prevention; Summary; 4 Log Storage Technologies; Introduction; Log Retention Policy; Log Storage Formats; Text-Based Log Files; Flat Text Files; Indexed Flat Text Files; Binary Files; Compressed Files , Database Storage of Log DataAdvantages; Disadvantages; Defining Database Storage Goals; What to Store?; Fast Retrieval; Reporting; Hadoop Log Storage; Advantages; Disadvantages; The Cloud and Hadoop; Getting Started with Amazon Elastic MapReduce; Navigating the Amazon; Uploading Logs to Amazon Simple Storage Services (S3); Create a Pig Script to Analyze an Apache Access Log; Processing Log Data in Amazon Elastic MapReduce (EMR); Log Data Retrieval and Archiving; Online; Near-line; Offline; Summary; References; 5 syslog-ng Case Study; Introduction; Obtaining syslog-ng , What Is syslog-ngsyslog-ng?Example Deployment; Configurations; Log Sources; Local syslog-ng Server; Global syslog-ng Server; Database logging; Troubleshooting syslog-ng; Summary; References; 6 Covert Logging; Introduction; Complete Stealthy Log Setup; Stealthy Log Generation; Hiding Logging; Hiding Logging with Misdirection; Stealthy Pickup of Logs; IDS Log Source; Log Collection Server; "Fake" Server or Honeypot; Logging in Honeypots; Honeynet's Shell Covert Keystroke Logger; Honeynet's Sebek2 Case Study; Covert Channels for Logging Brief; Summary; References , 7 Analysis Goals, Planning, and Preparation: What Are We Looking for? , English
    Additional Edition: ISBN 1-59749-635-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages