Security teams depend on telemetry, but raw logs and events are chaos until structured, enriched, and secured.

In Data Engineering for Cybersecurity, James Bonifield shows how to design scalable data pipelines using open source tools like Filebeat, Logstash, Redis, Kafka, and Elasticsearch.

Build systems that turn noise into insight and support real-time detection.

nostarch.com/data-engineering-

Book cover for Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open Source Tools by James Bonifield. The top portion features the title in large block letters, with “DATA ENGINEERING” in orange and black, “FOR” in smaller black text, and “CYBERSECURITY” in large black text. Below the subtitle appears in smaller black uppercase text. Beneath that is a black band with the author’s name in white.

The illustration shows a retro-style robot with a cylindrical head, one circular eye, and a panel of buttons on its chest. The robot holds a cloth bag and pours various geometric shapes—cubes, pyramids, cylinders, and prisms—into a large funnel. A hose runs from the funnel into a boxy desktop computer. The computer screen displays colorful data-style graphics: pie charts, bar charts, line plots, and geometric icons. A separate keyboard sits in front of the computer. The background is yellow with thick black outlines. In the bottom right corner is the No Starch Press logo
0

If you have a fediverse account, you can quote this note from your own instance. Search https://mastodon.social/users/nostarch/statuses/115560299283067597 on your instance and quote it. (Note that quoting is not supported in Mastodon.)