A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more. by Richard Medlin

A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more.

Iwc Blue Team

Richard Medlin

202 pages missing pub info (editions)

nonfiction computer science informative medium-paced
Powered by AI (Beta)
Loading...

Description

Have you ever found yourself questioning whether your network is in good hands? Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Managemen...

Read more

Community Reviews

Loading...

Content Warnings

Loading...