Logging and Log Management
The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log ManagementBy
- Anton Chuvakin, Ph.D., Stony Brook University, Stony Brook, NY., is a recognized security expert in the field of log management and PCI DSS compliance.
- Kevin Schmidt, is a team lead and senior software developer at SecureWorks, Inc.
- Chris Phillips, Christopher Phillips is a manager and senior software developer at Dell SecureWorks, Inc.
Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review.
Computer Security staff and program managers; system, network, and application administrators; computer security incident response teams; and others who are responsible for performing duties related to computer security log management.
Paperback, 460 Pages
Published: December 2012
" Anton Chuvakin and his co-authors Kevin Schmidt and Christopher Phillips bring significant real-world experience to the reader and an important book on the topic....For those that want to find the gold in their logs [it] is a great resource that shows how to maximize the gold that often lays hidden in your large stores of log data."--RSA Conference,December 2012
Chapter 1 Logs, Trees, Forest: the Big Picture
Chapter 2 What is a Log?
Chapter 3 Generating LogsChapter 4 Log Storage Technologies
Chapter 5 Case study: syslog-ngChapter 6 Covert logging
Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?Chapter 8 Simple Analysis Techniques
Chapter 9 Filtering, Matching and CorrelationChapter 10 Statistical Analysis
Chapter 11 Log Data MiningChapter 12 Reporting and Summarization
Chapter 13 Visualizing Log DataChapter 14 Logging Laws and Logging Mistakes
Chapter 15 Tools for Log Analysis and CollectionChapter 16 Log Management Procedures: Escalation, Response
Chapter 17 Attacks against logging systemsChapter 18 Logging for Programmers
Chapter 19 Logs and ComplianceChapter 20 Planning Your Own Log Analysis System
Chapter 21 Cloud LoggingChapter 22 Log Standard and Future Trends