Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Computer networks ; Security measures ; Information visualization ; Big data ; Data mining ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: Companies of all sizes are considering data lakes as a way to deal with terabytes of security data that can help them conduct forensic investigations and serve as an early indicator to identify bad or relevant behavior. Many think about replacing their existing SIEM (security information and event management) systems with Hadoop running on commodity hardware. Before your company jumps into the deep end, you first need to weigh several critical factors. This O'Reilly report takes you through technological and design options for implementing a data lake. Each option not only supports your data analytics use cases, but is also accessible by processes, workflows, third-party tools, and teams across your organization. Within this report, you'll explore: Five questions to ask before choosing architecture for your backend data store How data lakes can overcome scalability and data duplication issues Different options for storing context and unstructured log data Data access use cases covering both search and analytical queries via SQL Processes necessary for ingesting data into a data lake, including parsing, enrichment, and aggregation Four methods for embedding your SIEM into a data lake
    Note: Description based on online resource; title from title page (Safari, viewed January 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley
    ISBN: 9780321585530 , 0321585534
    Language: English
    Pages: Online-Ressource (xxiii, 523 p.) , 24 cm. +
    Additional Material: 1 CD-ROM (4 3/4 in.)
    Edition: Boston, Mass. Safari Books Online 2008 Electronic reproduction; Mode of access: World Wide Web
    Series Statement: Safari Tech Books Online
    Parallel Title: Erscheint auch als
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    DDC: 005.8
    RVK:
    Keywords: Computer security ; Information visualization ; Computer networks ; Computer security ; Information visualization ; Computer networks Security measures ; Computer networks / Security measures ; Information visualization ; Computer security ; Computer networks / Security measures ; Information visualization ; Computer security ; Rechnernetz ; Datensicherung ; Information ; Visualisierung ; Rechnernetz ; Datensicherung ; Information ; Visualisierung
    Description / Table of Contents: Includes bibliographical references and index
    Note: Parallel als Druckausg. erschienen , Electronic reproduction; Mode of access: World Wide Web
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780080553566
    Language: English
    Pages: 1 online resource (528 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't
    Note: Online resource; Title from title page (viewed April 18, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...