Description
Logging and Log Management
The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Authors: Schmidt Kevin, Phillips Chris, Chuvakin Anton
Language: EnglishSubjects for Logging and Log Management:
Keywords
46.15 €
In Print (Delivery period: 14 days).
Add to cart the book of Schmidt Kevin, Phillips Chris, Chuvakin Anton460 p. · 19x23.4 cm · Paperback
Description
/li>Contents
/li>Readership
/li>Biography
/li>Comment
/li>
Chapter 1 Logs, Trees, Forest: the Big Picture
Chapter 2 What is a Log?
Chapter 3 Generating Logs
Chapter 4 Log Storage Technologies
Chapter 5 Case study: syslog-ng
Chapter 6 Covert logging
Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?
Chapter 8 Simple Analysis Techniques
Chapter 9 Filtering, Matching and Correlation
Chapter 10 Statistical Analysis
Chapter 11 Log Data Mining
Chapter 12 Reporting and Summarization
Chapter 13 Visualizing Log Data
Chapter 14 Logging Laws and Logging Mistakes
Chapter 15 Tools for Log Analysis and Collection
Chapter 16 Log Management Procedures: Escalation, Response
Chapter 17 Attacks against logging systems
Chapter 18 Logging for Programmers
Chapter 19 Logs and Compliance
Chapter 20 Planning Your Own Log Analysis System
Chapter 21 Cloud Logging
Chapter 22 Log Standard and Future Trends
Computer Security staff and program managers; system, network, and application administrators; computer security incident response teams; and others who are responsible for performing duties related to computer security log management.
Prior to SecureWorks, Kevin worked for Reflex Security where he worked on an IPS engine and anti-virus software. And prior to this he was a lead developer and architect at GuardedNet, Inc.,which built one of the industry’s first SIEM platforms. Kevin is also a commissioned officer in the United States Navy Reserve (USNR).
Kevin has over 19 years of experience in software development and design, 11 of which have been in the network security space. He holds a B.Sc. in computer science.
Christopher Phillips is a manager and senior software developer at Dell SecureWorks, Inc. He is responsible for the design and development of the company's Threat Intelligence service platform. He also has responsibility for a team involved in integrating log and event information from many third party providers for customers to have their information analyzed by the Dell SecureWorks systems and security professionals. Prior to Dell SecureWorks, Christopher has worked for McKesson and Allscripts where he worked with clients on HIPAA compliance and security and integrating healthcare systems. Christopher has over 18 years of experience in software development and design. He holds a Bachelors of Science in Computer Science and an MBA.
Dr. Anton Chuvakin is a recognized security expert in the field of log
management and PCI DSS compliance. He is an author of the books "Security Warrior" and "PCI
Compliance" and has contributed to many others, while also publishing dozens of papers on
log management, correlation, data analysis, PCI DSS, and security management. His blog
(http://www.securitywarrior.org) is one of the most popular in the industry.
Additionaly, Anton teaches classes and presents
- Comprehensive coverage of log management including analysis, visualization, reporting and more
- Includes information on different uses for logs -- from system operations to regulatory compliance
- Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response
- Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation