Building a Next-Gen SOC with IBM QRadar: accelerate your security operations and detect cyber threats effectively
Are you looking for a QRadar guide that can help you to build a very efficient SOC for Threat Hunting, need-to-know software updates, or understanding compliance and reporting? Then this one-stop guide will help you to understand everything about IBM QRadar, and how it stores network data in real-ti...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham
Packt Publishing
2023
|
Links: | https://portal.igpublish.com/iglibrary/search/PACKT0006833.html https://portal.igpublish.com/iglibrary/search/PACKT0006833.html https://portal.igpublish.com/iglibrary/search/PACKT0006833.html https://portal.igpublish.com/iglibrary/search/PACKT0006833.html https://portal.igpublish.com/iglibrary/search/PACKT0006833.html https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |
Summary: | Are you looking for a QRadar guide that can help you to build a very efficient SOC for Threat Hunting, need-to-know software updates, or understanding compliance and reporting? Then this one-stop guide will help you to understand everything about IBM QRadar, and how it stores network data in real-time. This book will start with a quick introduction to QRadar components and architecture, and you will learn different ways to deploy the QRadar. It is important to be aware of the major and minor upgrades that take place in software hence you will learn how to scale, upgrade, and maintain QRadar. Once you get a detailed understanding of QRadar and how its environment is built, it is time to understand what all features can be used as per the business requirements, you will learn about Events, Flows, and searches through examples. As you advance, you will explore predefined QRadar applications and extensions that mine the data successfully and you would be integrating AI in Threat Management with confidence. Towards the end of this book, you will create and understand different types of apps in QRadar, troubleshoot and maintain it, and understand the current security challenges and address them through QRadar XDR. By the end of this book, you'll be able to apply IBM Qradar SOC's prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise. |
Physical Description: | 1 Online-Ressource (xix, 177 Seiten) |
ISBN: | 9781801079181 |
Staff View
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049424739 | ||
003 | DE-604 | ||
005 | 20240206 | ||
007 | cr|uuu---uuuuu | ||
008 | 231121s2023 xx o|||| 00||| eng d | ||
020 | |a 9781801079181 |9 978-1-80107-918-1 | ||
035 | |a (ZDB-221-PPK)PACKT0006833 | ||
035 | |a (OCoLC)1410703735 | ||
035 | |a (DE-599)BVBBV049424739 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-706 |a DE-898 | ||
100 | 1 | |a Kothekar, Ashish M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building a Next-Gen SOC with IBM QRadar |b accelerate your security operations and detect cyber threats effectively |c Ashish M Kothekar, Sandeep Patil |
264 | 1 | |a Birmingham |b Packt Publishing |c 2023 | |
300 | |a 1 Online-Ressource (xix, 177 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Are you looking for a QRadar guide that can help you to build a very efficient SOC for Threat Hunting, need-to-know software updates, or understanding compliance and reporting? Then this one-stop guide will help you to understand everything about IBM QRadar, and how it stores network data in real-time. This book will start with a quick introduction to QRadar components and architecture, and you will learn different ways to deploy the QRadar. It is important to be aware of the major and minor upgrades that take place in software hence you will learn how to scale, upgrade, and maintain QRadar. Once you get a detailed understanding of QRadar and how its environment is built, it is time to understand what all features can be used as per the business requirements, you will learn about Events, Flows, and searches through examples. As you advance, you will explore predefined QRadar applications and extensions that mine the data successfully and you would be integrating AI in Threat Management with confidence. Towards the end of this book, you will create and understand different types of apps in QRadar, troubleshoot and maintain it, and understand the current security challenges and address them through QRadar XDR. By the end of this book, you'll be able to apply IBM Qradar SOC's prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise. | ||
700 | 1 | |a Patil, Sandeep |d 20. Jh. |e Verfasser |0 (DE-588)1036963225 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80107-602-9 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-221-PPK | ||
912 | |a ZDB-221-PCL | ||
912 | |a ZDB-221-PCR | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034752151 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |l DE-Aug4 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |l DE-573 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |l DE-898 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |l DE-91 |p ZDB-221-PCL |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |l DE-706 |p ZDB-221-PCL |x Verlag |3 Volltext |
Record in the Search Index
DE-BY-TUM_katkey | 2768878 |
---|---|
_version_ | 1822086412330074113 |
adam_text | |
any_adam_object | |
author | Kothekar, Ashish M. Patil, Sandeep 20. Jh |
author_GND | (DE-588)1036963225 |
author_facet | Kothekar, Ashish M. Patil, Sandeep 20. Jh |
author_role | aut aut |
author_sort | Kothekar, Ashish M. |
author_variant | a m k am amk s p sp |
building | Verbundindex |
bvnumber | BV049424739 |
collection | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR |
ctrlnum | (ZDB-221-PPK)PACKT0006833 (OCoLC)1410703735 (DE-599)BVBBV049424739 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049424739</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240206</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231121s2023 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801079181</subfield><subfield code="9">978-1-80107-918-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PPK)PACKT0006833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1410703735</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049424739</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kothekar, Ashish M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building a Next-Gen SOC with IBM QRadar</subfield><subfield code="b">accelerate your security operations and detect cyber threats effectively</subfield><subfield code="c">Ashish M Kothekar, Sandeep Patil</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 177 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Are you looking for a QRadar guide that can help you to build a very efficient SOC for Threat Hunting, need-to-know software updates, or understanding compliance and reporting? Then this one-stop guide will help you to understand everything about IBM QRadar, and how it stores network data in real-time. This book will start with a quick introduction to QRadar components and architecture, and you will learn different ways to deploy the QRadar. It is important to be aware of the major and minor upgrades that take place in software hence you will learn how to scale, upgrade, and maintain QRadar. Once you get a detailed understanding of QRadar and how its environment is built, it is time to understand what all features can be used as per the business requirements, you will learn about Events, Flows, and searches through examples. As you advance, you will explore predefined QRadar applications and extensions that mine the data successfully and you would be integrating AI in Threat Management with confidence. Towards the end of this book, you will create and understand different types of apps in QRadar, troubleshoot and maintain it, and understand the current security challenges and address them through QRadar XDR. By the end of this book, you'll be able to apply IBM Qradar SOC's prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patil, Sandeep</subfield><subfield code="d">20. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036963225</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80107-602-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PPK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCR</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034752151</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006833.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049424739 |
illustrated | Not Illustrated |
indexdate | 2025-01-23T13:02:17Z |
institution | BVB |
isbn | 9781801079181 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034752151 |
oclc_num | 1410703735 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-706 DE-898 DE-BY-UBR |
physical | 1 Online-Ressource (xix, 177 Seiten) |
psigel | ZDB-221-PPK ZDB-221-PCL ZDB-221-PCR ZDB-221-PCL TUM_Paketkauf_2024 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spellingShingle | Kothekar, Ashish M. Patil, Sandeep 20. Jh Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively |
title | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively |
title_auth | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively |
title_exact_search | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively |
title_full | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively Ashish M Kothekar, Sandeep Patil |
title_fullStr | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively Ashish M Kothekar, Sandeep Patil |
title_full_unstemmed | Building a Next-Gen SOC with IBM QRadar accelerate your security operations and detect cyber threats effectively Ashish M Kothekar, Sandeep Patil |
title_short | Building a Next-Gen SOC with IBM QRadar |
title_sort | building a next gen soc with ibm qradar accelerate your security operations and detect cyber threats effectively |
title_sub | accelerate your security operations and detect cyber threats effectively |
url | https://portal.igpublish.com/iglibrary/search/PACKT0006833.html |
work_keys_str_mv | AT kothekarashishm buildinganextgensocwithibmqradaraccelerateyoursecurityoperationsanddetectcyberthreatseffectively AT patilsandeep buildinganextgensocwithibmqradaraccelerateyoursecurityoperationsanddetectcyberthreatseffectively |