EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Sponsored

Data Engineering for Cybersecurity - by James Bonifield (Paperback)

Data Engineering for Cybersecurity - by  James Bonifield (Paperback) - 1 of 1
$49.99 when purchased online
Target Online store #3991

About this item

Highlights

  • Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.
  • About the Author: James Bonifield is a cybersecurity professional with over a decade of experience analyzing malicious activity, implementing data pipelines, and training others in the security industry.
  • 336 Pages
  • Computers + Internet, Security

Description



Book Synopsis



Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.

When a cyber security incident occurs, how does anyone know? Data must leave workstations and servers, bounce across the network, and land in a central database before analysts can use it. This project-based book covers that complex space between an organization's computers and the security analyst tasked with protecting them. The guidance is straightforward, and the focus is on streamlining the process of gathering, transforming, and storing cybersecurity data using free and open-source tools.

The author elaborates on core logging strategies, while also emphasizing the importance of standardizing data, using encryption to protect transmitted data, and creating "data pipelines" that support cybersecurity, data analytics, and automation needs alike. You'll how to:

  • Implement core logging strategies using free tools such as the Elastic stack
  • Transform data to fit your needs, and configure your tools to send it back and forth
  • Secure your logging infrastructure by encrypting connections using TLS and SSH
  • Handle version control and backups with Git, and improve your efficiency with caching

By the end, you'll know how to enrich your security data, protect it from unauthorized parties, and automate your workflow in the process - leaving more room for creative thinking.



About the Author



James Bonifield is a cybersecurity professional with over a decade of experience analyzing malicious activity, implementing data pipelines, and training others in the security industry. He enjoys spending free time with his wife and kids, traveling, and tinkering with all things security and Python related.
Dimensions (Overall): 9.25 Inches (H) x 7.0 Inches (W)
Weight: .81 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 336
Genre: Computers + Internet
Sub-Genre: Security
Publisher: No Starch Press
Theme: Networking
Format: Paperback
Author: James Bonifield
Language: English
Street Date: August 26, 2025
TCIN: 94425493
UPC: 9781718504028
Item Number (DPCI): 247-28-0883
Origin: Made in the USA or Imported
If the item details above aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 1 inches length x 7 inches width x 9.25 inches height
Estimated ship weight: 0.812 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Related Categories

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member Services

Stores

Find a StoreClinicPharmacyOpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy