Your cart

Your cart is empty


Explore our range of products

15% off

No Starch Press,US Paperback English

Data Engineering for Cybersecurity

Build Secure Data Pipelines with Free and Open-Source Tools

By James Bonifield

Regular price £44.99 £38.24 Save 15%
Unit price
per
15% off

No Starch Press,US Paperback English

Data Engineering for Cybersecurity

Build Secure Data Pipelines with Free and Open-Source Tools

By James Bonifield

Regular price £44.99 £38.24 Save 15%
Unit price
per
 
Dispatched today with Tracked Delivery, free over £15
Delivery expected between Monday, 6th October and Tuesday, 7th October
(0 in cart)
Apple Pay
Google Pay
Maestro
Mastercard
PayPal
Shop Pay
Visa

You may also like

  • When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating 'data pipelines' that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as Elastic stack; Transform data to fit your needs, and configure your tools to send it back and forth; Secure your logging infrastructure by encrypting connections using TLS and SSH; Handle version control and backups with Git, and improve your efficiency with caching. By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.
When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating 'data pipelines' that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as Elastic stack; Transform data to fit your needs, and configure your tools to send it back and forth; Secure your logging infrastructure by encrypting connections using TLS and SSH; Handle version control and backups with Git, and improve your efficiency with caching. By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.