Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Copeland, Marshall (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berkeley, CA Apress 2021
Berkeley, CA
Ausgabe:1st ed. 2021
Schlagworte:
Online-Zugang:FAB01
FAW01
FHA01
FHD01
FHI01
FHM01
FHN01
FHO01
FHR01
FKE01
FLA01
FWS01
FWS02
HTW01
UBW01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV047580928
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 211110s2021 |||| o||u| ||||||eng d
020 |a 9781484271322  |c Online  |9 978-1-4842-7132-2 
024 7 |a 10.1007/978-1-4842-7132-2  |2 doi 
035 |a (ZDB-2-CWD)9781484271322 
035 |a (OCoLC)1286881591 
035 |a (DE-599)BVBBV047580928 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-1046  |a DE-1043  |a DE-Aug4  |a DE-898  |a DE-188  |a DE-523  |a DE-859  |a DE-863  |a DE-1050  |a DE-20  |a DE-1051  |a DE-862  |a DE-92  |a DE-573  |a DE-M347 
082 0 |a 004.165  |2 23 
100 1 |a Copeland, Marshall  |e Verfasser  |4 aut 
245 1 0 |a Cloud Defense Strategies with Azure Sentinel  |b Hands-on Threat Hunting in Cloud Logs and Services  |c by Marshall Copeland 
250 |a 1st ed. 2021 
264 1 |a Berkeley, CA  |b Apress  |c 2021 
264 1 |a Berkeley, CA  |b Apress 
300 |a 1 Online-Ressource (XVI, 285 p. 225 illus) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
650 4 |a Microsoft and .NET. 
650 4 |a Systems and Data Security 
650 4 |a Microsoft software 
650 4 |a Microsoft .NET Framework 
650 4 |a Computer security 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4842-7131-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-4842-7133-9 
856 4 0 |u https://doi.org/10.1007/978-1-4842-7132-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-CWD 
940 1 |q ZDB-2-CWD_2021 
999 |a oai:aleph.bib-bvb.de:BVB01-032966315 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FAB01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FAW01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHA01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHD01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHI01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHM01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHN01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHO01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FHR01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FKE01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FLA01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FWS01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l FWS02  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l HTW01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4842-7132-2  |l UBW01  |p ZDB-2-CWD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 929976
_version_ 1806194921293479936
adam_txt
any_adam_object
any_adam_object_boolean
author Copeland, Marshall
author_facet Copeland, Marshall
author_role aut
author_sort Copeland, Marshall
author_variant m c mc
building Verbundindex
bvnumber BV047580928
collection ZDB-2-CWD
ctrlnum (ZDB-2-CWD)9781484271322
(OCoLC)1286881591
(DE-599)BVBBV047580928
dewey-full 004.165
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004.165
dewey-search 004.165
dewey-sort 14.165
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-1-4842-7132-2
edition 1st ed. 2021
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03022nmm a2200613zc 4500</leader><controlfield tag="001">BV047580928</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211110s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484271322</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-7132-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-7132-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484271322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286881591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047580928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.165</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Copeland, Marshall</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud Defense Strategies with Azure Sentinel</subfield><subfield code="b">Hands-on Threat Hunting in Cloud Logs and Services</subfield><subfield code="c">by Marshall Copeland</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 285 p. 225 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft and .NET.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft .NET Framework</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-7131-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-7133-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2021</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032966315</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-7132-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047580928
illustrated Not Illustrated
index_date 2024-07-03T18:33:14Z
indexdate 2024-08-01T16:15:06Z
institution BVB
isbn 9781484271322
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032966315
oclc_num 1286881591
open_access_boolean
owner DE-860
DE-1046
DE-1043
DE-Aug4
DE-898
DE-BY-UBR
DE-188
DE-523
DE-859
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-1051
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
owner_facet DE-860
DE-1046
DE-1043
DE-Aug4
DE-898
DE-BY-UBR
DE-188
DE-523
DE-859
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-1051
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
physical 1 Online-Ressource (XVI, 285 p. 225 illus)
psigel ZDB-2-CWD
ZDB-2-CWD_2021
publishDate 2021
publishDateSearch 2021
publishDateSort 2021
publisher Apress
record_format marc
spellingShingle Copeland, Marshall
Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services
Microsoft and .NET.
Systems and Data Security
Microsoft software
Microsoft .NET Framework
Computer security
title Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services
title_auth Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services
title_exact_search Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services
title_exact_search_txtP Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services
title_full Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services by Marshall Copeland
title_fullStr Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services by Marshall Copeland
title_full_unstemmed Cloud Defense Strategies with Azure Sentinel Hands-on Threat Hunting in Cloud Logs and Services by Marshall Copeland
title_short Cloud Defense Strategies with Azure Sentinel
title_sort cloud defense strategies with azure sentinel hands on threat hunting in cloud logs and services
title_sub Hands-on Threat Hunting in Cloud Logs and Services
topic Microsoft and .NET.
Systems and Data Security
Microsoft software
Microsoft .NET Framework
Computer security
topic_facet Microsoft and .NET.
Systems and Data Security
Microsoft software
Microsoft .NET Framework
Computer security
url https://doi.org/10.1007/978-1-4842-7132-2
work_keys_str_mv AT copelandmarshall clouddefensestrategieswithazuresentinelhandsonthreathuntingincloudlogsandservices