Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.
Comprehensive coverage of log management including analysis, visualization, reporting and more
Includes information on different uses for logs -- from system operations to regulatory compliance
Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response
Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
Kevin J. Schmidt is a senior manager at Dell SecureWorks, Inc., anindustry leading MSSP, which is part of Dell. He is responsible for the design and development of a major part of the company’s SIEM platform. This includes data acquisition, correlation, and analysis of log data. Prior to SecureWorks, Kevin worked for Reflex Security, where he worked on an IPS engine and anti-virus software. And prior to this, he was a lead developer andarchitect at GuardedNet, Inc., which built one of the industry’s first SIEM platforms.
He is also a commissioned officer in the United States Navy Reserve (USNR). He has over 19 years of experience in software development and design, 11 of which have been in the network security space. He holds a Bachelor of Science in Computer Science.
Kevin has spent time designing cloud services components at Dell, including virtualized components to run in Dell’s own vCloud. These components are used to protect customers who use Dell’s cloud infrastructure. Additionally, he has been working with Hadoop, machine learning, and other technology in the cloud.
Kevin is co-author of Essential SNMP, second edition (O’Reilly and Associates, ISBN: 978-0-596-00840-6) and also Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management (Syngress, ISBN: 978-1-597-49635-3).
Comments about oreilly Logging and Log Management:
This is my first purchase of a Syngress book. It appears to have great content (am still in Chapter 1 after a quick review) but the quantity of language errors is very distracting. It's clear the editing of the book was not adequate. Hopefully this isn't an indication of the general level of quality of the products from Syngress.
In going to the Syngress web site, I was unable to find or report the errors. Obviously, they still have a few things to learn from O'Reilly.
Bottom Line Yes, I would recommend this to a friend