Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security
Publication details: Delhi: range Education Pvt Ltd., 2024Description: 386ISBN:- 9788196815028
- 005.8 SIN
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Available | E15716 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Available | E15720 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Available | E15717 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Available | E15718 | |||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Checked out | 12/05/2025 | E15719 | ||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Checked out | 17/08/2024 | E14634 | ||
![]() |
ACED | Computer Science and Information Technology | 005.8 SIN (Browse shelf(Opens below)) | Not for loan | E14633 |
Browsing ACED shelves, Collection: Computer Science and Information Technology Close shelf browser (Hides shelf browser)
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk.
Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
There are no comments on this title.