Item Infomation
Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Jeremy Martin | - |
| dc.contributor.author | Richard Medlin | - |
| dc.date.accessioned | 2026-04-23T07:30:43Z | - |
| dc.date.available | 2026-04-23T07:30:43Z | - |
| dc.date.issued | 2020 | - |
| dc.identifier.uri | http://thuvienso.thanglong.edu.vn//handle/TLU/13691 | - |
| dc.description.abstract | Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you are new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you do not know where to start. If you have ever asked yourself any of these questions, or you just want to learn about ELK Stack and Zeek (Bro), you have come to the right place. | vi |
| dc.language.iso | en | vi |
| dc.subject | Internet | Mạng máy tính | Hệ thống mạng | vi |
| dc.title | A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more | vi |
| dc.type | Sách/Book | vi |
| Appears in Collections | Khoa học máy tính - Toán | |
Files in This Item:
