- Paperback: 350 pages
- Publisher: Syngress; 1 edition (February 24, 2005)
- Language: English
- ISBN-10: 9781932266528
- ISBN-13: 978-1932266528
- ASIN: 1932266526
- Product Dimensions: 7.1 x 1.1 x 9.2 inches
- Shipping Weight: 2 pounds (View shipping rates and policies)
- Average Customer Review: 16 customer reviews
- Amazon Best Sellers Rank: #1,196,807 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
Customers who bought this item also bought
From the Author
"From the Author" Forum where the authors post timely updates and links to related sites
Downloadable chapters from these best selling books:
Google Hacking for Penetration Testers
Dr. Tom Shinder's Configuring ISA Server 2004
Snort 2.1 Intrusion Detection, Second Edition
Nessus Network Auditing
About the Author
Gabriele Giuseppini is a Software Design Engineer at Microsoft Corporation in the Security Business Unit, where he developed Microsoft Log Parser to analyze log files. Originally from Rome, Italy, after working for years in the digital signal processing field, he moved to the United States with his family in 1999, and joined Microsoft Corporation as a Software Design Engineer working on Microsoft Internet Information Services.
Mark Burnett (Technical Editor) is an independent researcher, consultant, and writer specializing in Windows security. Mark is author of Hacking the Code: ASP.NET Web Application Security (Syngress Publishing, ISBN: 1-932266-65-8), co-author of Maximum Windows 2000 Security (SAMS Publishing, ISBN: 0-672319-65-9), co-author of Stealing The Network: How to Own the Box (Syngress Publishing, ISBN: 1-931836-87-6), and is a contributor to Dr. Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks (Syngress Publishing, ISBN: 1-931836-66-3). He is a contributor and technical editor for Syngress Publishing's Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle (ISBN: 1-931836-69-8). Mark speaks at various security conferences and has published articles in Windows IT Pro Magazine (formerly Windows & .NET Magazine), Redmond Magazine, Information Security, Windows Web Solutions, Security Administrator, SecurityFocus.com, and various other print and online publications. Mark is a Microsoft Windows Server Most Valued Professional (MVP) for Internet Information Services (IIS).
Top customer reviews
The data extract process has been completed and the gurus are now building the dashboards ... but so far everyone who has seen preliminary results of the analysis really likes what they see - and I'm recommended this book to several co-workers with similar tasks facing them.
I can't recommend this book highly enough - it's great!
The book is written by the author of the tool. The tool's interface appears simple. The power of it is revealed in the variety of uses to which it can be put -- those uses involve the sophisticated command variations possible. The book reveals precisely this.
If you're overwhelmed by system information and how to monitor that without a bunch of 3rd party tools, take a look at Log Parser. It may be just what you need.
Syngress was acquired by Elsevier Publishing. The source files are now available at [...]
1. many pages in the book use a dark gray background with black text to highlight ideas - its hard to read, not enough contrast.
2. Not found anything in the book that isn't already on the web - in large numbers, with hundreds (thousands) of sites churning the same information (welcome to the internet). But it is still a valuable resource for writing scripts.
Within minutes I had several scripts in production and was on my way to writing much more complex queries to squeeze every drop of valuable data from my logs. I'm querying IIS logs, Event Logs, CSV files and more with ease.
I've got this book at my side any time I go to write a new script. I would definitely recommend it to others.
Many of the examples are aimed at maintaining and improving security. I found the techniques described helpful for chasing linked defects in a multiple-machine server farm.
Unfortunately, the examples from the book are no longer available on the publisher's web site.