語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cloud Defense Strategies with Azure ...
~
Copeland, Marshall.
Cloud Defense Strategies with Azure Sentinel = Hands-on Threat Hunting in Cloud Logs and Services /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cloud Defense Strategies with Azure Sentinel / by Marshall Copeland.
其他題名:
Hands-on Threat Hunting in Cloud Logs and Services /
作者:
Copeland, Marshall.
面頁冊數:
XVI, 285 p. 225 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Systems and Data Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-7132-2
ISBN:
9781484271322
Cloud Defense Strategies with Azure Sentinel = Hands-on Threat Hunting in Cloud Logs and Services /
Copeland, Marshall.
Cloud Defense Strategies with Azure Sentinel
Hands-on Threat Hunting in Cloud Logs and Services /[electronic resource] :by Marshall Copeland. - 1st ed. 2021. - XVI, 285 p. 225 illus.online resource.
Part I -- Chapter 1: Azure Sentinel Overview -- Chapter 2: Other Azure Security Services -- Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities -- Part II -- Chapter 4: Sentinel Data Connection -- Chapter 5: Threat Intelligence -- Chapter 6: Multi-Tenant Architecture -- Part III -- Chapter 7: Kusto Query Language and Threat Hunting -- Chapter 8: Introduction to MITRE Matrix -- Chapter 9:Azure Sentinel Operations.
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. You will: Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace.
ISBN: 9781484271322
Standard No.: 10.1007/978-1-4842-7132-2doiSubjects--Topical Terms:
677062
Systems and Data Security.
LC Class. No.: QA76.76.M52
Dewey Class. No.: 004.165
Cloud Defense Strategies with Azure Sentinel = Hands-on Threat Hunting in Cloud Logs and Services /
LDR
:03314nam a22003855i 4500
001
1054785
003
DE-He213
005
20211001124249.0
007
cr nn 008mamaa
008
220103s2021 xxu| s |||| 0|eng d
020
$a
9781484271322
$9
978-1-4842-7132-2
024
7
$a
10.1007/978-1-4842-7132-2
$2
doi
035
$a
978-1-4842-7132-2
050
4
$a
QA76.76.M52
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
004.165
$2
23
100
1
$a
Copeland, Marshall.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1070199
245
1 0
$a
Cloud Defense Strategies with Azure Sentinel
$h
[electronic resource] :
$b
Hands-on Threat Hunting in Cloud Logs and Services /
$c
by Marshall Copeland.
250
$a
1st ed. 2021.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
XVI, 285 p. 225 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Part I -- Chapter 1: Azure Sentinel Overview -- Chapter 2: Other Azure Security Services -- Chapter 3: Getting Started with Azure Sentinel and XDR Capabilities -- Part II -- Chapter 4: Sentinel Data Connection -- Chapter 5: Threat Intelligence -- Chapter 6: Multi-Tenant Architecture -- Part III -- Chapter 7: Kusto Query Language and Threat Hunting -- Chapter 8: Introduction to MITRE Matrix -- Chapter 9:Azure Sentinel Operations.
520
$a
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers. This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement. After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel. You will: Understand Azure Sentinel technical benefits and functionality Configure to support incident response Integrate with Azure Security standards Be aware of challenges and costs for the Azure log analytics workspace.
650
2 4
$a
Systems and Data Security.
$3
677062
650
1 4
$a
Microsoft and .NET.
$3
1114109
650
0
$a
Computer security.
$3
557122
650
0
$a
Microsoft .NET Framework.
$3
565417
650
0
$a
Microsoft software.
$3
1253736
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484271315
776
0 8
$i
Printed edition:
$z
9781484271339
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7132-2
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入