Logging and Log Management book cover

Logging and Log Management

The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

By
  • Anton Chuvakin, Ph.D., Stony Brook University, Stony Brook, NY., is a recognized security expert in the field of log management and PCI DSS compliance.
  • Kevin Schmidt, is a team lead and senior software developer at SecureWorks, Inc.
  • Chris Phillips, Christopher Phillips is a manager and senior software developer at Dell SecureWorks, Inc.

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review.

Paperback, 460 Pages

Published: November 2012

Imprint: Syngress

ISBN: 978-1-59749-635-3

Reviews

  • "…Anton Chuvakin and his co-authors Kevin Schmidt and Christopher Phillips bring significant real-world experience to the reader and an important book on the topic....For those that want to find the gold in their logs…[it] is a great resource that shows how to maximize the gold that often lays hidden in your large stores of log data."--RSA Conference, December 2012


Contents

  • Chapter 1 Logs, Trees, Forest: the Big Picture

    Chapter 2 What is a Log?

    Chapter 3 Generating Logs

    Chapter 4 Log Storage Technologies

    Chapter 5 Case study: syslog-ng

    Chapter 6 Covert logging

    Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?

    Chapter 8 Simple Analysis Techniques

    Chapter 9 Filtering, Matching and Correlation

    Chapter 10 Statistical Analysis

    Chapter 11 Log Data Mining

    Chapter 12 Reporting and Summarization

    Chapter 13 Visualizing Log Data

    Chapter 14 Logging Laws and Logging Mistakes

    Chapter  15 Tools for Log Analysis and Collection

    Chapter 16 Log Management Procedures: Escalation, Response

    Chapter 17 Attacks against logging systems

    Chapter 18 Logging for Programmers

    Chapter 19 Logs and Compliance

    Chapter 20 Planning Your Own Log Analysis System

    Chapter 21 Cloud Logging

    Chapter 22 Log Standard and Future Trends

Advertisement

advert image