000 01165cam a22001814a 4500
005 20250605164344.0
008 250528s ||||||||||||||||||||||||d
035 _a23779
040 _aGR-AtMCL
_bgre
_dGR-AtMCL
_eAACR2
245 1 _aMethods and Tools for Log Analysis/Overview and Case Studies
260 _c2016
300 _a42
520 _aAbstract, Acknowledgements, Introduction, Log Files, Security Software, Operating Systems (OS), Application Software, Log Management, Sys-log Based Infrastructure, Security Information and Event Management (SIEM), SIEM System Fundamentals, Data Collection, Data Aggregation, Data Normalization, Event Correlation, Threat Alerting, Reporting Compliance, SIEM Tools Open Source Security (OSSEC), Solar Winds Log and Event Manager (LEM), SUMO Logic, McAFEE Enterprise Log Manager, GFI Events Manager, IBM Security QRadar SIEM, Correlog SIEM Correlation Server, Logrythm, Splunk, Criteria for Choosing the Suitable Tool for an Organization, Comparison Among the SIEM Tools, Siem Tools Challenges, Conclusion, References.
700 1 _aTsoukatou Panagiota
_99311
942 _cDS
999 _c8716
_d8716