Item Infomation
| Title: | A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more |
| Authors: | Richard Medlin |
| Keywords: | Internet | Mạng máy tính | Hệ thống mạng |
| Issue Date: | 2020 |
| Abstract: | Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you are new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you do not know where to start. If you have ever asked yourself any of these questions, or you just want to learn about ELK Stack and Zeek (Bro), you have come to the right place. |
| URI: | http://thuvienso.thanglong.edu.vn//handle/TLU/13691 |
| Appears in Collections | Khoa học máy tính - Toán |
ABSTRACTS VIEWS
2
VIEWS & DOWNLOAD
0
Files in This Item:
