Every day, security professionals and system administrators must analyze hundreds of log files detailing all activity
(malicious or not) from multiple devices and applications including: File and Web servers, intrusion detection systems,
firewalls, routers, and workstations.
The volume of data can be overwhelming resulting in critical pieces of information being ignored. This book details how open source tools and scripts can provide useful, repeatable information from the seemingly endless data.