No Starch Press<p>This hands-on guide shows how to build secure, scalable data pipelines using open source tools like Filebeat, Logstash, Kafka, and Ansible.</p><p>Learn to collect, transform, enrich, and centralize security telemetry from Windows, Linux, and network sources. A practical resource for anyone supporting detection, forensics, or incident response.</p><p><a href="https://nostarch.com/data-engineering-cybersecurity" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/data-engineering-</span><span class="invisible">cybersecurity</span></a></p><p><a href="https://mastodon.social/tags/securityengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityengineering</span></a> <a href="https://mastodon.social/tags/blueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueTeam</span></a> <a href="https://mastodon.social/tags/loganalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>loganalysis</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>