Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cloud defense strategies with Azure ...
~
Copeland, Marshall.
Linked to FindBook
Google Book
Amazon
博客來
Cloud defense strategies with Azure Sentinel = hands-on threat hunting in cloud logs and services /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cloud defense strategies with Azure Sentinel/ by Marshall Copeland.
Reminder of title:
hands-on threat hunting in cloud logs and services /
Author:
Copeland, Marshall.
Published:
Berkeley, CA :Apress : : 2021.,
Description:
xvi, 285 p. :ill., digital ;24 cm.
[NT 15003449]:
Part I -- Chapter 1: Azure Sentinel Overview -- Chapter 2: Other Azure Security Services -- Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities -- Part II -- Chapter 4: Sentinel Data Connection -- Chapter 5: Threat Intelligence -- Chapter 6: Multi-Tenant Architecture -- Part III -- Chapter 7: Kusto Query Language and Threat Hunting -- Chapter 8: Introduction to MITRE Matrix -- Chapter 9:Azure Sentinel Operations.
Contained By:
Springer Nature eBook
Subject:
Cloud computing - Security measures. -
Online resource:
https://doi.org/10.1007/978-1-4842-7132-2
ISBN:
9781484271322
Cloud defense strategies with Azure Sentinel = hands-on threat hunting in cloud logs and services /
Copeland, Marshall.
Cloud defense strategies with Azure Sentinel
hands-on threat hunting in cloud logs and services /[electronic resource] :by Marshall Copeland. - Berkeley, CA :Apress :2021. - xvi, 285 p. :ill., digital ;24 cm.
Part I -- Chapter 1: Azure Sentinel Overview -- Chapter 2: Other Azure Security Services -- Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities -- Part II -- Chapter 4: Sentinel Data Connection -- Chapter 5: Threat Intelligence -- Chapter 6: Multi-Tenant Architecture -- Part III -- Chapter 7: Kusto Query Language and Threat Hunting -- Chapter 8: Introduction to MITRE Matrix -- Chapter 9:Azure Sentinel Operations.
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. You will: Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace.
ISBN: 9781484271322
Standard No.: 10.1007/978-1-4842-7132-2doiSubjects--Topical Terms:
1375313
Cloud computing
--Security measures.
LC Class. No.: QA76.585 / .C67 2021
Dewey Class. No.: 005.8
Cloud defense strategies with Azure Sentinel = hands-on threat hunting in cloud logs and services /
LDR
:03020nmm a2200325 a 4500
001
2251605
003
DE-He213
005
20211001124249.0
006
m d
007
cr nn 008maaau
008
220215s2021 cau s 0 eng d
020
$a
9781484271322
$q
(electronic bk.)
020
$a
9781484271315
$q
(paper)
024
7
$a
10.1007/978-1-4842-7132-2
$2
doi
035
$a
978-1-4842-7132-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.585
$b
.C67 2021
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.585
$b
.C782 2021
100
1
$a
Copeland, Marshall.
$3
2163278
245
1 0
$a
Cloud defense strategies with Azure Sentinel
$h
[electronic resource] :
$b
hands-on threat hunting in cloud logs and services /
$c
by Marshall Copeland.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
xvi, 285 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I -- Chapter 1: Azure Sentinel Overview -- Chapter 2: Other Azure Security Services -- Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities -- Part II -- Chapter 4: Sentinel Data Connection -- Chapter 5: Threat Intelligence -- Chapter 6: Multi-Tenant Architecture -- Part III -- Chapter 7: Kusto Query Language and Threat Hunting -- Chapter 8: Introduction to MITRE Matrix -- Chapter 9:Azure Sentinel Operations.
520
$a
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. You will: Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace.
650
0
$a
Cloud computing
$x
Security measures.
$3
1375313
650
0
$a
Microsoft Azure (Computing platform)
$3
3201298
650
1 4
$a
Microsoft and .NET.
$3
3134847
650
2 4
$a
Systems and Data Security.
$3
898223
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7132-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9409714
電子資源
11.線上閱覽_V
電子書
EB QA76.585 .C67 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login