headerdesktop cupontimer26noi25

MAI SUNT 00:00:00:00

MAI SUNT

X

headermobile cupontimer26noi25

MAI SUNT 00:00:00:00

MAI SUNT

X

Promotii popup img

CUPON activ: LIB20RANDURI

Aplica-l in comanda »

Data Engineering for Cybersecurity

De (autor): James Bonifield

Data Engineering for Cybersecurity - James Bonifield

Data Engineering for Cybersecurity

De (autor): James Bonifield

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as Elastic stack Transform data to fit your needs, and configure your tools to send it back and forth Secure your logging infrastructure by encrypting connections using TLS and SSH Handle version control and backups with Git, and improve your efficiency with caching
By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as the Elastic stack Transform data to
Citește mai mult

-10%

transport gratuit

PRP: 323.93 Lei

!

Acesta este Prețul Recomandat de Producător. Prețul de vânzare al produsului este afișat mai jos.

291.54Lei

291.54Lei

323.93 Lei

Primești 291 puncte

Important icon msg

Primești puncte de fidelitate după fiecare comandă! 100 puncte de fidelitate reprezintă 1 leu. Folosește-le la viitoarele achiziții!

Livrare in 2-4 saptamani

Plasează rapid comanda

Important icon msg

Poți comanda acest produs introducând numărul tău de telefon. În cel mai scurt timp vei fi apelat de un operator Libris pentru preluarea datelor necesare.

Completează mai jos numărul tău de telefon

Descrierea produsului

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as Elastic stack Transform data to fit your needs, and configure your tools to send it back and forth Secure your logging infrastructure by encrypting connections using TLS and SSH Handle version control and backups with Git, and improve your efficiency with caching
By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as the Elastic stack Transform data to
Citește mai mult

S-ar putea să-ți placă și

De același autor

Părerea ta e inspirație pentru comunitatea Libris!

Istoricul tău de navigare

Acum se comandă

Noi suntem despre cărți, și la fel este și

Newsletter-ul nostru.

Abonează-te la veștile literare și primești un cupon de -10% pentru viitoarea ta comandă!

*Reducerea aplicată prin cupon nu se cumulează, ci se aplică reducerea cea mai mare.

Mă abonez image one
Mă abonez image one
Accessibility Logo

Salut! Te pot ajuta?

X