Item Infomation

Full metadata record
DC FieldValueLanguage
dc.contributorJeremy Martin-
dc.contributor.authorRichard Medlin-
dc.date.accessioned2026-04-23T07:30:43Z-
dc.date.available2026-04-23T07:30:43Z-
dc.date.issued2020-
dc.identifier.urihttp://thuvienso.thanglong.edu.vn//handle/TLU/13691-
dc.description.abstractDid you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you are new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you do not know where to start. If you have ever asked yourself any of these questions, or you just want to learn about ELK Stack and Zeek (Bro), you have come to the right place.vi
dc.language.isoenvi
dc.subjectInternet | Mạng máy tính | Hệ thống mạngvi
dc.titleA network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and morevi
dc.typeSách/Bookvi
Appears in CollectionsKhoa học máy tính - Toán

Files in This Item:
Thumbnail
  • TVS.008800_A network defender_s guide to threat detection - Medlin, Richard - 2020-GT.pdf
      Restricted Access
  • Giới thiệu
    • Size : 3,38 MB

    • Format : Adobe PDF

  • Thumbnail
  • TVS.008800_A network defender_s guide to threat detection - Medlin, Richard - 2020.pdf
      Restricted Access
  • Đăng nhập để đọc nội dung file
    • Size : 13,28 MB

    • Format : Adobe PDF