語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing networks with ELK stack : = building zero trust network defense /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing networks with ELK stack :/ Ram Patel.
其他題名:
building zero trust network defense /
作者:
Patel, Ram.
面頁冊數:
1 online resource (483 pages)
標題:
COMPUTERS / History. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000630.html
ISBN:
9789355516831
Securing networks with ELK stack : = building zero trust network defense /
Patel, Ram.
Securing networks with ELK stack :
building zero trust network defense /Ram Patel. - 1 online resource (483 pages)
Includes bibliographical references and index.
Securing networks with ELK stack : building zero trust network defense -- Dedication -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Code Bundle and Coloured Images -- Table of Contents -- Chapter 1: Introduction to Zero Trust Network Architecture -- Chapter 2: Zero Trust Network Architecture: Design and Deployment Strategies -- Chapter 3: Zero Trust Network Architecture: Data Gathering Strategies -- Chapter 4: Overview of ELK Stack and its Capabilities -- Chapter 5: Design of ELK Stack Components -- Chapter 6: Data Ingestion with ELK -- Chapter 7: Data Visualization with ELK -- Chapter 8: Effective Dashboards with Kibana -- Chapter 9: Unlocking Insights: ELKʼs Machine Learning Capabilities -- Chapter 10: Introduction to Elastic Security -- Chapter 11: Threat Detection and Prevention -- Chapter 12: Incident Response and Investigation -- Chapter 13: Compliance and Reporting -- Chapter 14: Introduction to Zeek -- Chapter 15: Zeek Data Collection and Analysis -- Chapter 16: Unlocking Synergies: Zeek and Elastic Security Integration in Action -- Chapter 17: Future Directions for Elastic Security -- Chapter 18: A Unified Recap: Safeguarding Networks with ELK -- Index.
Access restricted to authorized users and institutions.
Step into the dynamic world of zero trust network architecture with this comprehensive handbook. Starting with an exploration of zero trust principles, each chapter unveils new insights and practical strategies. From crafting strategic blueprints to implementing hands-on deployment tactics, discover the intricacies of building a resilient zero trust network capable of thwarting modern threats. Journey through the extensive capabilities of ELK Stack, essential for fortifying a zero trust paradigm. Learn the nuances of data acquisition strategies and efficient ingestion methods with ELK, enabling robust data visualization and dashboard creation using Kibana. Explore advanced functionalities like Machine Learning driven anomaly detection to enhance your defenses against emerging threats. Explore Elastic Security's suite, encompassing threat detection, incident response, and compliance reporting, crucial elements in strengthening network defenses. Utilize the transformative potential of Zeek in network security, from foundational principles to advanced integration with Elastic Security. Real-world case studies showcase the synergy between Zeek and Elastic Security, providing insights into future-proof network protection strategies. Arm yourself with the knowledge and tools necessary to navigate the evolving landscape of network security.
Mode of access: World Wide Web.
ISBN: 9789355516831Subjects--Topical Terms:
1483913
COMPUTERS / History.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.C64
Dewey Class. No.: 303.48
Securing networks with ELK stack : = building zero trust network defense /
LDR
:03534nam a2200289 i 4500
001
1157330
006
m eo d
007
cr cn |||m|||a
008
250717s2024 ob 000 0 eng d
020
$a
9789355516831
020
$a
9789355519542
035
$a
BPB0000630
041
0
$a
eng
050
0 0
$a
QA76.9.C64
082
0 0
$a
303.48
100
1
$a
Patel, Ram.
$3
1483938
245
1 0
$a
Securing networks with ELK stack :
$b
building zero trust network defense /
$c
Ram Patel.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2024.
264
4
$c
©2024
300
$a
1 online resource (483 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Securing networks with ELK stack : building zero trust network defense -- Dedication -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Code Bundle and Coloured Images -- Table of Contents -- Chapter 1: Introduction to Zero Trust Network Architecture -- Chapter 2: Zero Trust Network Architecture: Design and Deployment Strategies -- Chapter 3: Zero Trust Network Architecture: Data Gathering Strategies -- Chapter 4: Overview of ELK Stack and its Capabilities -- Chapter 5: Design of ELK Stack Components -- Chapter 6: Data Ingestion with ELK -- Chapter 7: Data Visualization with ELK -- Chapter 8: Effective Dashboards with Kibana -- Chapter 9: Unlocking Insights: ELKʼs Machine Learning Capabilities -- Chapter 10: Introduction to Elastic Security -- Chapter 11: Threat Detection and Prevention -- Chapter 12: Incident Response and Investigation -- Chapter 13: Compliance and Reporting -- Chapter 14: Introduction to Zeek -- Chapter 15: Zeek Data Collection and Analysis -- Chapter 16: Unlocking Synergies: Zeek and Elastic Security Integration in Action -- Chapter 17: Future Directions for Elastic Security -- Chapter 18: A Unified Recap: Safeguarding Networks with ELK -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Step into the dynamic world of zero trust network architecture with this comprehensive handbook. Starting with an exploration of zero trust principles, each chapter unveils new insights and practical strategies. From crafting strategic blueprints to implementing hands-on deployment tactics, discover the intricacies of building a resilient zero trust network capable of thwarting modern threats. Journey through the extensive capabilities of ELK Stack, essential for fortifying a zero trust paradigm. Learn the nuances of data acquisition strategies and efficient ingestion methods with ELK, enabling robust data visualization and dashboard creation using Kibana. Explore advanced functionalities like Machine Learning driven anomaly detection to enhance your defenses against emerging threats. Explore Elastic Security's suite, encompassing threat detection, incident response, and compliance reporting, crucial elements in strengthening network defenses. Utilize the transformative potential of Zeek in network security, from foundational principles to advanced integration with Elastic Security. Real-world case studies showcase the synergy between Zeek and Elastic Security, providing insights into future-proof network protection strategies. Arm yourself with the knowledge and tools necessary to navigate the evolving landscape of network security.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / History.
$2
bisacsh
$3
1483913
650
7
$a
COMPUTERS / Electronic Commerce.
$2
bisacsh
$3
1483939
650
7
$a
COMPUTERS / Computer Literacy.
$2
bisacsh
$3
1483846
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000630.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入