Get Free Shipping on orders over $79
Data Engineering for Cybersecurity : Build Secure Data Pipelines with Free and Open-Source Tools - James Bonifield
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Go digital and save!

Data Engineering for Cybersecurity

Build Secure Data Pipelines with Free and Open-Source Tools

By: James Bonifield

Paperback | 26 August 2025

At a Glance

Paperback


$81.75

or 4 interest-free payments of $20.44 with

 or 

Ships in 10 to 15 business days

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.

Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.

The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to-

  • Implement core logging strategies using free tools such as the Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth
  • Secure your logging infrastructure by encrypting connections using TLS and SSH
  • Handle version control and backups with Git, and improve your efficiency with caching

By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.

More in Network Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Transforming Cybersecurity with Machine Learning - Al-Sakib Khan Pathan

RRP $252.00

$219.75

13%
OFF
Transforming Cybersecurity with Machine Learning - Al-Sakib Khan Pathan
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Tech-Smart Parenting : How to keep your kids happy and safe online - Catherine Knibbs
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Digital Wisdom : Searching for Agency in the Age of AI - Richard Lachman