Jumat, 10 Mei 2013

Wow! eBook: Logging and Log Management - 5 new eBooks


Wow! eBook: Logging and Log Management - 5 new eBooks

Link to Wow! eBook

Logging and Log Management

Posted: 10 May 2013 03:58 PM PDT

Book Description

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review.

  • Comprehensive coverage of log management including analysis, visualization, reporting and more
  • Includes information on different uses for logs — from system operations to regulatory compliance
  • Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response
  • Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation

Table of Contents
Chapter 1. Logs, Trees, Forest: the Big Picture
Chapter 2. What is a Log?
Chapter 3. Generating Logs
Chapter 4. Log Storage Technologies
Chapter 5. Case study: syslog-ng
Chapter 6. Covert logging
Chapter 7. Analysis Goals, Planning and Preparation: What Are We Looking for?
Chapter 8. Simple Analysis Techniques
Chapter 9. Filtering, Matching and Correlation
Chapter 10. Statistical Analysis
Chapter 11. Log Data Mining
Chapter 12. Reporting and Summarization
Chapter 13. Visualizing Log Data
Chapter 14. Logging Laws and Logging Mistakes
Chapter 15. Tools for Log Analysis and Collection
Chapter 16. Log Management Procedures: Escalation, Response
Chapter 17. Attacks against logging systems
Chapter 18. Logging for Programmers
Chapter 19. Logs and Compliance
Chapter 20. Planning Your Own Log Analysis System
Chapter 21. Cloud Logging
Chapter 22. Log Standard and Future Trends

Book Details

  • Paperback: 460 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597496359
  • ISBN-13: 978-1597496353
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Logging and Log Management appeared first on Wow! eBook.

FISMA and the Risk Management Framework

Posted: 10 May 2013 03:55 PM PDT

Book Description

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense, Office of the Directory of National Intelligence, Committee for National Security Systems and the National Institute of Standards and Technology.

Based on the new FISMA requirements for 2011 and beyond, this book catalogs the processes, procedures and specific security recommendations underlying the new Risk Management Framework. Written by an experienced FISMA practitioner, this book presents an effective system of information assurance, real-time risk monitoring and secure configurations for common operating systems.

  • Learn how to build a robust, near real-time risk management system and comply with FISMA
  • Discover the changes to FISMA compliance and beyond
  • Gain your systems the authorization they need

Table of Contents
Chapter 1. Introduction
Chapter 2. Federal Information Security Fundamentals
Chapter 3. Thinking About Risk
Chapter 4. Thinking About Systems
Chapter 5. Success Factors
Chapter 6. Risk Management Framework Planning and Initiation
Chapter 7. Risk Management Framework Steps 1 & 2
Chapter 8. Risk Management Framework Steps 3 & 4
Chapter 9. Risk Management Framework Steps 5 & 6
Chapter 10. System Security Plan
Chapter 11. Security Assessment Report
Chapter 12. Plan of Action and Milestones
Chapter 13. Risk Management
Chapter 14. Continuous Monitoring
Chapter 15. Contingency Planning
Chapter 16. Privacy
Chapter 17. Federal Initiatives

Appendix A. References
Appendix B. Acronyms
Appendix C. Glossary

Book Details

  • Paperback: 584 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597496413
  • ISBN-13: 978-1597496414
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post FISMA and the Risk Management Framework appeared first on Wow! eBook.

Federal Cloud Computing

Posted: 10 May 2013 03:45 PM PDT

Book Description

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.

  • Provides a common understanding of the federal requirements as they apply to cloud computing
  • Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
  • Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization

Table of Contents
Chapter 1. Introduction to the Federal Cloud Computing Strategy
Chapter 2. Cloud Computing Standards
Chapter 3. A Case for Open Source
Chapter 4. Security and Privacy in Public Cloud Computing
Chapter 5. Applying the NIST Risk Management Framework
Chapter 6. Risk Management
Chapter 7. Comparison of FISMA with Other Security Compliance Standards
Chapter 8. FedRAMP Primer
Chapter 9. The FedRAMP Cloud Computing Security Requirements
Chapter 10. Security Assessment and Authorization: Governance, Preparation, and Execution
Chapter 11. Strategies for Continuous Monitoring
Chapter 12. Cost-Effective Compliance using Security Automation
Chapter 13. A Case Study for Cloud Service Providers

Book Details

  • Paperback: 448 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597497371
  • ISBN-13: 978-1597497374
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Federal Cloud Computing appeared first on Wow! eBook.

Data Hiding

Posted: 10 May 2013 03:42 PM PDT

Book Description

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.

  • Review of the latest data hiding techniques presented at world-renownded conferences
  • Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7
  • Dives deep into the less known approaches to data hiding, covert communications, and advanced malware
  • Includes never before published information about next generation methods of data hiding
  • Outlines a well-defined methodology for countering threats
  • Looks ahead at future predictions for data hiding

Table of Contents
Chapter 1. History of Secret Writing
Chapter 2. Four Easy Data Hiding Exercises
Chapter 3. Steganography
Chapter 4. Multimedia Data Hiding
Chapter 5. Data Hiding among Android Mobile Devices
Chapter 6. Apple iOS Data Hiding
Chapter 7. Operating System Data Hiding
Chapter 8. Virtual Data Hiding
Chapter 9. Data Hiding in Network Protocols
Chapter 10. Forensics and Anti-Forensics
Chapter 11. Mitigation Strategies
Chapter 12. Futures

Book Details

  • Paperback: 350 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597497436
  • ISBN-13: 978-1597497435
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Data Hiding appeared first on Wow! eBook.

Windows Forensic Analysis Toolkit, 3rd Edition

Posted: 10 May 2013 03:38 PM PDT

Book Description

Now in its third edition, Harlan Carvey has updated Windows Forensic Analysis Toolkit to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, 2nd Ed. (ISBN: 9781597494229), which focuses primarily on XP.

  • Complete coverage and examples on Windows 7 systems
  • Contains Lessons from the Field, Case Studies, and War Stories
  • Companion online material, including electronic printable checklists, cheat sheets, free custom tools, and walk-through demos

Table of Contents
Chapter 1. Analysis Concepts
Chapter 2. Immediate Response
Chapter 3. Volume Shadow Copies
Chapter 4. File Analysis
Chapter 5. Registry Analysis
Chapter 6. Malware Detection
Chapter 7. Timeline Analysis
Chapter 8. Application Analysis

Book Details

  • Paperback: 296 pages
  • Publisher: Syngress; 3rd Edition (January 2012)
  • Language: English
  • ISBN-10: 1597497274
  • ISBN-13: 978-1597497275
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Windows Forensic Analysis Toolkit, 3rd Edition appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar