feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Beijing [u.a.] :O'Reilly,
    UID:
    almafu_BV013862012
    Format: XIV, 313 S. : Ill., graph. Darst.
    Edition: 1. ed.
    ISBN: 0-596-00020-0
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: SNMP
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV041631991
    Format: 1 Online-Ressource (XXX, 431 S.).
    ISBN: 978-1-59749-635-3 , 978-1-59749-636-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Beijing [u. a.] : O'Reilly
    UID:
    b3kat_BV035085873
    Format: XV, 442 S. , graph. Darst.
    Edition: 2. ed.
    ISBN: 0596008406 , 9780596008406
    Note: Früher mit der ISBN 0596000200
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: SNMP
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV041254711
    Format: XXX, 431 S. , graph. Darst. , 24 cm
    ISBN: 9781597496353 , 1597496359
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edoccha_BV042305261
    Format: 1 Online-Ressource (XXX, 431 Seiten).
    ISBN: 978-1-59749-636-0 , 978-1-59749-635-3 , 1-59749-636-7
    Note: Includes bibliographical references and index. - Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on different uses for logs -- from system operations to regulatory complianceFeatures case Studies on syslog-ng and actual real-world situations where logs came in handy in incident responseProvides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-59749-635-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-59749-635-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edocfu_BV042305261
    Format: 1 Online-Ressource (XXX, 431 Seiten).
    ISBN: 978-1-59749-636-0 , 978-1-59749-635-3 , 1-59749-636-7
    Note: Includes bibliographical references and index. - Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on different uses for logs -- from system operations to regulatory complianceFeatures case Studies on syslog-ng and actual real-world situations where logs came in handy in incident responseProvides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-59749-635-3
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-59749-635-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Logdatei ; Analyse
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9947368444402882
    Format: 1 online resource (463 p.)
    Edition: 1st edition
    ISBN: 1-283-85557-7 , 1-59749-636-7
    Content: Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. Comprehensive coverage of log management including analysis, visualization, reporting and moreIncludes information on
    Note: Description based upon print version of record. , Half Title; Logging and Log Management; Copyright; Contents; Acknowledgments; About the Authors; About the Technical Editor; Foreword; Preface; 1 Logs, Trees, Forest: The Big Picture; Introduction; Log Data Basics; What Is Log Data?; How is Log Data Transmitted and Collected?; What is a Log Message?; The Logging Ecosystem; First Things First: Ask Questions, Have a Plan; Log Message Generation; Log Message Filtering and Normalization; Log Message Collection; Logging in the Cloud; Log Analysis; Log Message Long-Term Storage; A Look at Things to Come; Logs Are Underrated; Logs Can Be Useful , Resource ManagementIntrusion Detection; Troubleshooting; Forensics; Boring Audit, Fun Discovery; People, Process, Technology; Security Information and Event Management (SIEM); Summary; References; 2 What is a Log?; Introduction; Definitions; Logs? What logs?; Log Formats and Types; Log Syntax; Log Content; Criteria of Good Logging; Ideal Logging Scenario; Summary; References; 3 Log Data Sources; Introduction; Logging Sources; Syslog; Basic Logging with syslogd; Syslog Message Classification; The "Mark" Facility; Syslog Priority; Syslog.conf; The Mark Interval; Syslogd Output , The Syslog ProtocolSNMP; Managers and Agents; SNMP Traps and Notifications; SNMP Get; SNMP Set; Issues with SNMP as a Log Data Alternative; The Windows Event Log; Log Source Classification; Security-Related Host Logs; Operating System Logs; Network Daemon Logs; Application Logs; Security-Related Network Logs; Network Infrastructure Logs; Security Host Logs; Host Intrusion Detection and Prevention; Summary; 4 Log Storage Technologies; Introduction; Log Retention Policy; Log Storage Formats; Text-Based Log Files; Flat Text Files; Indexed Flat Text Files; Binary Files; Compressed Files , Database Storage of Log DataAdvantages; Disadvantages; Defining Database Storage Goals; What to Store?; Fast Retrieval; Reporting; Hadoop Log Storage; Advantages; Disadvantages; The Cloud and Hadoop; Getting Started with Amazon Elastic MapReduce; Navigating the Amazon; Uploading Logs to Amazon Simple Storage Services (S3); Create a Pig Script to Analyze an Apache Access Log; Processing Log Data in Amazon Elastic MapReduce (EMR); Log Data Retrieval and Archiving; Online; Near-line; Offline; Summary; References; 5 syslog-ng Case Study; Introduction; Obtaining syslog-ng , What Is syslog-ngsyslog-ng?Example Deployment; Configurations; Log Sources; Local syslog-ng Server; Global syslog-ng Server; Database logging; Troubleshooting syslog-ng; Summary; References; 6 Covert Logging; Introduction; Complete Stealthy Log Setup; Stealthy Log Generation; Hiding Logging; Hiding Logging with Misdirection; Stealthy Pickup of Logs; IDS Log Source; Log Collection Server; "Fake" Server or Honeypot; Logging in Honeypots; Honeynet's Shell Covert Keystroke Logger; Honeynet's Sebek2 Case Study; Covert Channels for Logging Brief; Summary; References , 7 Analysis Goals, Planning, and Preparation: What Are We Looking for? , English
    Additional Edition: ISBN 1-59749-635-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages