Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 20,48

Économisez
EUR 15,34 (43%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool par [Giuseppini, Gabriele, Burnett, Mark, Jeremy Faircloth]
Publicité sur l'appli Kindle

Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool 1 , Format Kindle

5.0 étoiles sur 5 1 commentaire client

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 20,48

Description du produit

Présentation de l'éditeur

Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.

System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.

  • Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the Microsoft Web site
  • This book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks

Book Description

Ready-to-Use Scripts from Log Parser Pioneers Including Gabriele Giuseppini, Developer of Microsoft Log Parser

?        Analyze the Log Files from Windows Server, Snort IDS, NetMon, IIS Server, Exchange Server, and More

?        Web Site Provides Hundreds of Original, Working Scripts to Automate Tasks

Step-by-Step Instructions for Using Log Parser to Data Mine All Your Logs

With Log Parser, you create the data processing pipeline that best fits your needs. However, Log Parser’s flexible design, with its endless scripting possibilities, can make the tool difficult to employ effectively for both first-time and seasoned users. As a result of my interactions with users on public newsgroups and forums, I have come to realize that, even though the tool documentation provides a complete reference, users also need real-world examples of what they can achieve with Log Parser. This book is aimed at filling that gap. -- Gabriele Giuseppini

Scripts and Samples Included in the Book and Downloadable from syngress.com include:

Retrieving Event Log fields

Searching for Information

Ordering the Output

Parsing Text Files

Querying System Information

Parsing NetMon Files

Implementing Custom Input Formats

DATAGRID Output Format

Creating Custom Text Files

Creating Charts

Uploading to a SQL Database

Converting Log File Formats

Analyzing Request Details

Analyzing Error Requests

Analyzing Illegal Requests

Viewing Logon/Logoff Activity

Tracking Authentication Failures

Benign versus Warning Events

Identifying Brute Force Attacks

Tracking Security Policy Violations

Auditing File Access Attempts

Identifying Benign System Events

Tracking System Failures

Creating Downtime Reports

Creating System Error Reports

Identifying Application Errors

Served Application Security

Log Parser’s Netmon Format

Finding Soft Errors in TCP Requests

Log Parser, Netmon and Proxy Servers

Watch for Worms/Intruders

NT Performance Log Queries

Gathering Snort Logs

Building an Alerts Detail Report

Managing Snort Rules

Log File Conversion

Log Rotation and Archival

Separating Logs

Monitoring Logons

Identifying Suspicious Files

Finding Modification Dates

Reconstructing Intrusions

Assessing IIS Configurations

Monitoring IIS Contents

Parsing Cluster Service Logs

Parsing Excel Spreadsheets

Windows Service Configuration

Parsing Internet Explorer Favorites

Querying Arbitrary WMI Classes

Simplifying Query Creation

Data-Driven Formatting

Managing Identity Flow to Remote Input Sources

Maintaining a Responsive User Interface

Combining Query Output with External Data

Publishing LogQuery Output by E-mail

Using Query Results to Construct an .REG File

Storing LogQuery output in a new Access Database

Creating Data on the Fly

Storing Data to a File

Leveraging the Multiplex Feature

Creating Chart Output

Excluding Extraneous Data

Privacy Concerns

Intervals and Sampling

Ranges

Correcting For Log Roll Drift

Obviating the Time-Based Query: iCheckpoint

Command Line Output

Skipping Rows

Rows with No Delimiters

Building Dynamic Queries

Joins Using Parameter Passing

Joins Embedded in the WHERE Clause

Your Solutions Membership Gives You Access to:

The complete code listings from the book

Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 27708 KB
  • Nombre de pages de l'édition imprimée : 350 pages
  • Editeur : Syngress; Édition : 1 (10 février 2005)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B006NV2E8Q
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5 1 commentaire client
  • Classement des meilleures ventes d'Amazon: n°569.489 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  • Voulez-vous nous parler de prix plus bas?

click to open popover

Commentaires client

5,0 sur 5 étoiles
5 étoiles
1
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoile
0
Partagez votre opinion avec les autres clients
Voir les 1 commentaires client

Meilleurs commentaires des clients

le 13 octobre 2016
Format: Format Kindle|Achat vérifié
0Commentaire|Ce commentaire vous a-t-il été utile ?OuiNonSignaler un abus

Commentaires client les plus utiles sur Amazon.com

Amazon.com: 4,1 sur 5 étoiles 17 commentaires
5,0 sur 5 étoilesGreat book!
le 30 novembre 2012 - Publié sur Amazon.com
Achat vérifié
Une personne a trouvé cela utile.
5,0 sur 5 étoilesSuperb book on a powerful Windows tool
le 29 décembre 2009 - Publié sur Amazon.com
Achat vérifié
Une personne a trouvé cela utile.
5,0 sur 5 étoilesloved it.
le 16 janvier 2013 - Publié sur Amazon.com
Achat vérifié
4 personnes ont trouvé cela utile.
5,0 sur 5 étoilesExcellent Real World Examples
le 2 mars 2006 - Publié sur Amazon.com
Achat vérifié
2 personnes ont trouvé cela utile.
4,0 sur 5 étoilesGood useful toolkit
le 3 novembre 2009 - Publié sur Amazon.com
Achat vérifié

Où en sont vos commandes ?

Livraison et retours

Besoin d'aide ?