| 000 | 01165cam a22001814a 4500 | ||
|---|---|---|---|
| 005 | 20250605164344.0 | ||
| 008 | 250528s ||||||||||||||||||||||||d | ||
| 035 | _a23779 | ||
| 040 |
_aGR-AtMCL _bgre _dGR-AtMCL _eAACR2 |
||
| 245 | 1 | _aMethods and Tools for Log Analysis/Overview and Case Studies | |
| 260 | _c2016 | ||
| 300 | _a42 | ||
| 520 | _aAbstract, Acknowledgements, Introduction, Log Files, Security Software, Operating Systems (OS), Application Software, Log Management, Sys-log Based Infrastructure, Security Information and Event Management (SIEM), SIEM System Fundamentals, Data Collection, Data Aggregation, Data Normalization, Event Correlation, Threat Alerting, Reporting Compliance, SIEM Tools Open Source Security (OSSEC), Solar Winds Log and Event Manager (LEM), SUMO Logic, McAFEE Enterprise Log Manager, GFI Events Manager, IBM Security QRadar SIEM, Correlog SIEM Correlation Server, Logrythm, Splunk, Criteria for Choosing the Suitable Tool for an Organization, Comparison Among the SIEM Tools, Siem Tools Challenges, Conclusion, References. | ||
| 700 | 1 |
_aTsoukatou Panagiota _99311 |
|
| 942 | _cDS | ||
| 999 |
_c8716 _d8716 |
||