The definitive guide to KQL: using Kusto Query Language for operations, defending, and threat hunting
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Microsoft Press
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780138293482/?ar |
Zusammenfassung: | Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide designed for a broad range of people with varying experience in KQL will quickly make KQL second nature for information security. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (480 Seiten) illustrations |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-103624007 | ||
003 | DE-627-1 | ||
005 | 20240603113659.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240603s2024 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)103624007 | ||
035 | |a (DE-599)KEP103624007 | ||
035 | |a (ORHE)9780138293482 | ||
035 | |a (DE-627-1)103624007 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.74 |2 23/eng/20240521 | |
100 | 1 | |a Morowczynski, Mark |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The definitive guide to KQL |b using Kusto Query Language for operations, defending, and threat hunting |c Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Microsoft Press |c [2024] | |
300 | |a 1 Online-Ressource (480 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide designed for a broad range of people with varying experience in KQL will quickly make KQL second nature for information security. | ||
650 | 0 | |a Query languages (Computer science) | |
650 | 0 | |a Computer security | |
650 | 4 | |a Langages d'interrogation | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Trent, Rod |e VerfasserIn |4 aut | |
700 | 1 | |a Zorich, Matthew |e VerfasserIn |4 aut | |
700 | 1 | |a Johnson, Ann |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780138293482/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-103624007 |
---|---|
_version_ | 1829007837810917376 |
adam_text | |
any_adam_object | |
author | Morowczynski, Mark Trent, Rod Zorich, Matthew |
author2 | Johnson, Ann |
author2_role | ctb |
author2_variant | a j aj |
author_facet | Morowczynski, Mark Trent, Rod Zorich, Matthew Johnson, Ann |
author_role | aut aut aut |
author_sort | Morowczynski, Mark |
author_variant | m m mm r t rt m z mz |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)103624007 (DE-599)KEP103624007 (ORHE)9780138293482 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02051nam a22004092c 4500</leader><controlfield tag="001">ZDB-30-ORH-103624007</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240603113659.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240603s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)103624007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP103624007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780138293482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)103624007</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23/eng/20240521</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Morowczynski, Mark</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The definitive guide to KQL</subfield><subfield code="b">using Kusto Query Language for operations, defending, and threat hunting</subfield><subfield code="c">Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Microsoft Press</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (480 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide designed for a broad range of people with varying experience in KQL will quickly make KQL second nature for information security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Query languages (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Langages d'interrogation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trent, Rod</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zorich, Matthew</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Ann</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780138293482/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-103624007 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:39Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (480 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Microsoft Press |
record_format | marc |
spelling | Morowczynski, Mark VerfasserIn aut The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson [First edition]. [Place of publication not identified] Microsoft Press [2024] 1 Online-Ressource (480 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide designed for a broad range of people with varying experience in KQL will quickly make KQL second nature for information security. Query languages (Computer science) Computer security Langages d'interrogation Sécurité informatique Trent, Rod VerfasserIn aut Zorich, Matthew VerfasserIn aut Johnson, Ann MitwirkendeR ctb |
spellingShingle | Morowczynski, Mark Trent, Rod Zorich, Matthew The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting Query languages (Computer science) Computer security Langages d'interrogation Sécurité informatique |
title | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting |
title_auth | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting |
title_exact_search | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting |
title_full | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson |
title_fullStr | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson |
title_full_unstemmed | The definitive guide to KQL using Kusto Query Language for operations, defending, and threat hunting Mark Morowczynski, Rod Trent, Matthew Zorich ; foreword by Ann Johnson |
title_short | The definitive guide to KQL |
title_sort | definitive guide to kql using kusto query language for operations defending and threat hunting |
title_sub | using Kusto Query Language for operations, defending, and threat hunting |
topic | Query languages (Computer science) Computer security Langages d'interrogation Sécurité informatique |
topic_facet | Query languages (Computer science) Computer security Langages d'interrogation Sécurité informatique |
work_keys_str_mv | AT morowczynskimark thedefinitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT trentrod thedefinitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT zorichmatthew thedefinitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT johnsonann thedefinitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT morowczynskimark definitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT trentrod definitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT zorichmatthew definitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting AT johnsonann definitiveguidetokqlusingkustoquerylanguageforoperationsdefendingandthreathunting |