Item Infomation


Title: A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
Authors: Richard Medlin
Keywords: Internet | Mạng máy tính | Hệ thống mạng
Issue Date: 2020
Abstract: Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you are new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you do not know where to start. If you have ever asked yourself any of these questions, or you just want to learn about ELK Stack and Zeek (Bro), you have come to the right place.
URI: http://thuvienso.thanglong.edu.vn//handle/TLU/13691
Appears in CollectionsKhoa học máy tính - Toán
ABSTRACTS VIEWS

2

VIEWS & DOWNLOAD

0

Files in This Item:
Thumbnail
  • TVS.008800_A network defender_s guide to threat detection - Medlin, Richard - 2020-GT.pdf
      Restricted Access
  • Giới thiệu
    • Size : 3,38 MB

    • Format : Adobe PDF

  • Thumbnail
  • TVS.008800_A network defender_s guide to threat detection - Medlin, Richard - 2020.pdf
      Restricted Access
  • Đăng nhập để đọc nội dung file
    • Size : 13,28 MB

    • Format : Adobe PDF