Data Engineering for Cybersecurity 303122

Код товару: 303122Паперова книга
  • ISBN
    978-1718504028
  • Бренд
  • Автор
  • Рік
    2025
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization’s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.

The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating “data pipelines” that support cybersecurity, data analytics, and automation needs alike. You’ll how to:
  • Implement core logging strategies using free tools such as the Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth
  • Secure your logging infrastructure by encrypting connections using TLS and SSH
  • Handle version control and backups with Git, and improve your efficiency with caching
By the end, you’ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process – leaving more room for creative thinking.

About the Author
James Bonifield is a cybersecurity professional with over a decade of experience analyzing malicious activity, implementing data pipelines, and training others in the security industry. He enjoys spending free time with his wife and kids, traveling, and tinkering with all things security and Python related.
2'100 ₴
Купити
Monobank
до 10 платежей
от 236 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Data Engineering for Cybersecurity - фото 1
Data Engineering for Cybersecurity - фото 2
Data Engineering for Cybersecurity - фото 3
Data Engineering for Cybersecurity - фото 4
Інші книги No Starch Press
The Wireless Cookbook
303167
Bill Zimmerman
2'300 ₴
Practical SDR: Getting Started with Software-Defined Radio
303256
David ClarkPaul Clark
1'200 ₴
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Cybersecurity Tabletop Exercises: From Planning to Execution
303127
Robert LelewskiJohn Hollenberger
1'200 ₴

Характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Рік
    2025
  • Сторінок
    336
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Від видавця

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization’s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.

The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating “data pipelines” that support cybersecurity, data analytics, and automation needs alike. You’ll how to:
  • Implement core logging strategies using free tools such as the Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth
  • Secure your logging infrastructure by encrypting connections using TLS and SSH
  • Handle version control and backups with Git, and improve your efficiency with caching
By the end, you’ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process – leaving more room for creative thinking.

About the Author
James Bonifield is a cybersecurity professional with over a decade of experience analyzing malicious activity, implementing data pipelines, and training others in the security industry. He enjoys spending free time with his wife and kids, traveling, and tinkering with all things security and Python related.

Відгуки про Data Engineering for Cybersecurity

Data Engineering for Cybersecurity
Data Engineering for Cybersecurity
2'100 ₴
Купити
Персонально для вас
The Hack Is Back: Techniques to Beat Hackers at Their Own Games 1st Edition
286458
Jesse VarsaloneChristopher Haller
1'900 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Data Storytelling with Altair and AI
289715
Angelica Lo Duca
1'800 ₴