Perpustakaan SMKN 10 Jakarta

Open Source Library Management System

  • Beranda
  • Informasi
  • Berita
  • Bantuan
  • Pustakawan
  • Area Anggota
  • Pilih Bahasa :
    Bahasa Arab Bahasa Bengal Bahasa Brazil Portugis Bahasa Inggris Bahasa Spanyol Bahasa Jerman Bahasa Indonesia Bahasa Jepang Bahasa Melayu Bahasa Persia Bahasa Rusia Bahasa Thailand Bahasa Turki Bahasa Urdu

Pencarian berdasarkan :

SEMUA Pengarang Subjek ISBN/ISSN Pencarian Spesifik

Pencarian terakhir:

{{tmpObj[k].text}}
Image of Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Text

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Gupta, Rajneesh - Nama Orang;

Strengthen your cybersecurity posture with Wazuh’s powerful security monitoring and compliance capabilities.

Security Monitoring with Wazuh is a comprehensive, hands-on guide that helps you deploy, configure, and optimize Wazuh to detect threats, automate incident response, and enforce compliance. With real-world use cases, step-by-step configurations, and tool integrations, this book equips you to build an enterprise-grade defense system.

You'll begin by setting up an Intrusion Detection System (IDS) using Wazuh and integrating Suricata to monitor network and host-based threats. Moving forward, you'll explore malware detection, vulnerability assessment, and security automation with SOAR. The book also covers threat intelligence, incident response, and proactive threat hunting, helping you detect and mitigate cybersecurity risks effectively.

Beyond detection, you'll enforce compliance with industry standards such as MITRE ATT&CK, PCI DSS, and GDPR, ensuring regulatory adherence and security best practices. By integrating Wazuh with TheHive, Cortex, MISP, and other security tools, you'll streamline threat analysis and response.

By the end of this book, you'll master Wazuh's full potential, enabling you to deploy, manage, and enhance security monitoring across your infrastructure—from on-premises to cloud environments.

What you will learn
Set up an intrusion detection system (IDS) using Wazuh and Suricata
Implement file integrity monitoring to detect unauthorized changes
Integrate MISP for automated threat intelligence and IOC detection
Leverage TheHive and Cortex for security automation and incident response
Deploy Wazuh for proactive malware detection and endpoint security
Use Shuffle to automate security operations and streamline responses
Hunt for threats with Osquery, log analysis, and MITRE ATT&CK mapping
Ensure compliance with PCI DSS, GDPR, and security best practices


Ketersediaan
2015004 GUP sPerpustakaan SMKN 10 Jkt (Teknologi)Tersedia
Informasi Detail
Judul Seri
-
No. Panggil
004 GUP s
Penerbit
United Kingdom : PACKT PUBLISHING., 2024
Deskripsi Fisik
323 pages
Bahasa
English
ISBN/ISSN
ISBN-13 978-1837632152
Klasifikasi
004
Tipe Isi
-
Tipe Media
-
Tipe Pembawa
-
Edisi
cet 1
Subjek
TEKNOLOGI
Info Detail Spesifik
-
Pernyataan Tanggungjawab
-
Versi lain/terkait

Tidak tersedia versi lain

Lampiran Berkas
Komentar

Anda harus login sebelum memberikan komentar

Perpustakaan SMKN 10 Jakarta
  • Informasi
  • Layanan
  • Pustakawan
  • Area Anggota

Tentang Kami

Kenal lebih dekat dengan Perpustakaan SMKN 10 Jakarta, klik link instagram kami dan temukan buku buku favorit kalian ... 

Ayo berkunjung ke Perpustakaan...

Cari

masukkan satu atau lebih kata kunci dari judul, pengarang, atau subjek

Donasi untuk SLiMS Kontribusi untuk SLiMS?

© 2025 — Senayan Developer Community

Ditenagai oleh SLiMS
Pilih subjek yang menarik bagi Anda
  • Karya Umum
  • Filsafat
  • Agama
  • Ilmu-ilmu Sosial
  • Bahasa
  • Ilmu-ilmu Murni
  • Ilmu-ilmu Terapan
  • Kesenian, Hiburan, dan Olahraga
  • Kesusastraan
  • Geografi dan Sejarah
Icons made by Freepik from www.flaticon.com
Pencarian Spesifik