Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

Data Engineering for Cybersecurity

By: (Author) James Bonifield

Extended Catalogue

Ksh 8,100.00

Format: Paperback / Softback

ISBN-10: 1718504020

ISBN-13: 9781718504028

Publisher: No Starch Press,US

Imprint: No Starch Press,US

Country of Manufacture: GB

Country of Publication: GB

Publication Date: Aug 26th, 2025

Print length: 336 Pages

Choose your Location

Shipping & Delivery

Door Delivery

Delivery fee

Delivery in 10 to 14 days

  • Description

  • Reviews

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools. The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating 'data pipelines' that support cybersecurity, data analytics, and automation needs alike. You'll how to: Implement core logging strategies using free tools such as Elastic stack; Transform data to fit your needs, and configure your tools to send it back and forth; Secure your logging infrastructure by encrypting connections using TLS and SSH; Handle version control and backups with Git, and improve your efficiency with caching. By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.
Learn essential strategies to streamline and secure your organization''s data handling from a cybersecurity expert who has trained military intelligence personnel.

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization’s computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.

The author elaborates on core but often overlooked logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating “data pipelines” that support cybersecurity, data analytics, and automation needs alike. You’ll how to:

  • Implement core logging strategies using free tools such as Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth 
  • Secure your logging infrastructure by encrypting connections using TLS and SSH 
  • Handle version control and backups with Git, and improve your efficiency with caching

By the end, you’ll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process – leaving more room for creative thinking.

Get Data Engineering for Cybersecurity by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by No Starch Press,US and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment

Customer Reviews

Based on 0 reviews

Mind, Body, & Spirit