25,95 €
25,95 €
inkl. MwSt.
Erscheint vor. 22.07.25
payback
13 °P sammeln
25,95 €
25,95 €
inkl. MwSt.
Erscheint vor. 22.07.25

Alle Infos zum eBook verschenken
payback
13 °P sammeln
Als Download kaufen
25,95 €
inkl. MwSt.
Erscheint vor. 22.07.25
payback
13 °P sammeln
Jetzt verschenken
25,95 €
inkl. MwSt.
Erscheint vor. 22.07.25

Alle Infos zum eBook verschenken
payback
13 °P sammeln

Unser Service für Vorbesteller - Ihr Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
  • Format: ePub

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming,…mehr

Produktbeschreibung
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel. When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to:
  • Implement core logging strategies using free tools such as Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth
  • Secure your logging infrastructure by encrypting connections using TLS and SSH
  • Handle version control and backups with Git, and improve your efficiency with caching
By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
James Bonifield is a civilian IT Cybersecurity Specialist with the U.S. Army Corps of Engineers (USACE), where he develops data pipelines and analyzes threats. He has worked in civilian roles for the National Geospatial-Intelligence Agency and U.S. Marine Corps Forces Cyberspace Command. James has extensive experience training military personnel, civilians, and federal law enforcement on essential cybersecurity skills.