Description
By: James Bonifield
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.
When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization’s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.
The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating “data pipelines” that support cybersecurity, data analytics, and automation needs alike. You’ll how to:
By the end, you’ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process – leaving more room for creative thinking.
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.
When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization’s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.
The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating “data pipelines” that support cybersecurity, data analytics, and automation needs alike. You’ll how to:
- Implement core logging strategies using free tools such as Elastic stack
- Transform data to fit your needs, and configure your tools to send it back and forth
- Secure your logging infrastructure by encrypting connections using TLS and SSH
- Handle version control and backups with Git, and improve your efficiency with caching
By the end, you’ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process – leaving more room for creative thinking.
You may also like
![How to Be Good at Science, Technology, and Engineering](http://buybookbook.com/cdn/shop/files/9781465473592_{width}x.jpg?v=1739554685)
How to Be Good at Science, Technology, and Engineering
Sale priceHK$148.00
Regular priceHK$220.00
Re-stocking soon熱銷中 Top Trending
![Dog Man 13: Dog Man: Big Jim Begins: A Graphic Novel (Dog Man #13)-Graphic novel / Comic book / Manga: genres-買書書 BuyBookBook](http://buybookbook.com/cdn/shop/files/225700-jumbo-2258903_{width}x.jpg?v=1735344830)
Dog Man 13: Dog Man: Big Jim Begins: A Graphic Novel (Dog Man #13)
Sale priceFrom HK$75.00
Regular priceHK$150.00
In stock![Kay's Marvellous Medicine: A (Terrifying) True History of Disgusting diseases and Crazy Cures (Adam Kay) - 買書書 BuyBookBook](http://buybookbook.com/cdn/shop/files/Kay_sMarvellousMedicine-AGrossandGruesomeHistoryoftheHumanBody1_0ffda84d-2423-4ad2-afef-146949496d8f_{width}x.webp?v=1734613903)
Kay's Marvellous Medicine: A (Terrifying) True History of Disgusting diseases and Crazy Cures (Adam Kay)
Sale priceFrom HK$79.00
Regular priceHK$107.90
In stock![Pet Simulator Chapter Book #1-Children’s / Teenage general interest: Computer and video games-買書書 BuyBookBook](http://buybookbook.com/cdn/shop/files/225575-jumbo-2260691_{width}x.webp?v=1738069710)
Pet Simulator Chapter Book #1 Two Tales of Teamwork
Sale priceHK$48.00
Regular priceHK$84.00
In stock![Warriors: The Ultimate Guide: Updated and Expanded Edition-Children’s interactive and activity books and kits-買書書 BuyBookBook](http://buybookbook.com/cdn/shop/files/9780063143968_{width}x.webp?v=1734998002)
Warriors: The Ultimate Guide: Updated and Expanded Edition
Sale priceHK$179.00
Regular priceHK$270.00
In stock![Charlie and the Chocolate Factory (US)(Paperback)(Roald Dahl) PRHUS](http://buybookbook.com/cdn/shop/files/CharlieandtheChocolateFactory_Paperback_RoaldDahl_{width}x.jpg?v=1734514832)
Charlie and the Chocolate Factory (US)(Paperback)(Roald Dahl)
Sale priceHK$59.00
Regular priceHK$90.00
In stock![Dog Man (正版) #11 Twenty Thousand Fleas Under the Sea (Dav Pilkey)-Fiction: 幽默搞笑 Humorous-買書書 BuyBookBook](http://buybookbook.com/cdn/shop/files/DogMan_11TwentyThousandFleasUndertheSea_DavPilkey_{width}x.jpg?v=1734656123)
Dog Man (正版) #11 Twenty Thousand Fleas Under the Sea (Dav Pilkey)
Sale priceFrom HK$59.00
Regular priceHK$90.00
In stock