Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Design and deploy Microsoft Azure Se...
~
Udayakumar, Puthiyavan.
Linked to FindBook
Google Book
Amazon
博客來
Design and deploy Microsoft Azure Sentinel for IoMT = enhance iomt cybersecurity operations with intelligent analytics /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Design and deploy Microsoft Azure Sentinel for IoMT/ by Puthiyavan Udayakumar, Dr. R Anandan.
Reminder of title:
enhance iomt cybersecurity operations with intelligent analytics /
Author:
Udayakumar, Puthiyavan.
other author:
Anandan, R.
Published:
Berkeley, CA :Apress : : 2025.,
Description:
xxiv, 354 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: Get Started with Microsoft Sentinel and IoMT -- Chapter 2: Architecting and Deploying Microsoft Sentinel -- Chapter 3: Engineering Microsoft Sentinel for Security Operations -- Chapter 4: Threat Detection, Investigation, and Response.
Contained By:
Springer Nature eBook
Subject:
Internet of things - Security measures. -
Online resource:
https://doi.org/10.1007/979-8-8688-2040-3
ISBN:
9798868820403
Design and deploy Microsoft Azure Sentinel for IoMT = enhance iomt cybersecurity operations with intelligent analytics /
Udayakumar, Puthiyavan.
Design and deploy Microsoft Azure Sentinel for IoMT
enhance iomt cybersecurity operations with intelligent analytics /[electronic resource] :by Puthiyavan Udayakumar, Dr. R Anandan. - Berkeley, CA :Apress :2025. - xxiv, 354 p. :ill., digital ;24 cm.
Chapter 1: Get Started with Microsoft Sentinel and IoMT -- Chapter 2: Architecting and Deploying Microsoft Sentinel -- Chapter 3: Engineering Microsoft Sentinel for Security Operations -- Chapter 4: Threat Detection, Investigation, and Response.
Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments. The book guides you to deploy, and optimize Microsoft Sentinel specifically for IoMT environments, guaranteeing the protection of critical medical systems and patient data. The book starts with introducing the fundamental concepts of Sentinel, its role in securing IoMT, and the latest advancements in healthcare cybersecurity. Architecting and Deploying Microsoft Sentinel focuses on designing a Sentinel workspace tailored for IoMT, integrating medical device logs, and applying Zero Trust principles to secure connected healthcare environments. Engineering Microsoft Sentinel for Security Operations explores how security engineers can configure analytics, automate threat response, and optimize Security Operations Center (SOC) workflows to mitigate IoMT-specific threats, such as ransomware attacks on medical devices or unauthorized access to patient records. Finally, Threat Detection, Investigation, and Response provides practical techniques for security analysts, including crafting detection rules for IoMT anomalies, investigating incidents involving medical devices, and leveraging Kusto Query Language (KQL) to proactively hunt for threats in healthcare networks. By the end of this book, you will be equipped to design, implement, and operate a comprehensive security framework for IoMT environments using Microsoft Sentinel. What You Will Learn: Design and deploy a Microsoft Sentinel workspace tailored specifically for IoMT, including integrating medical device logs. Implementing Zero Trust security principles to safeguard connected healthcare systems. Gain practical skills in creating custom detection rules for IoMT devices, investigating security incidents involving medical systems Understanding compliance with key healthcare regulations (such as HIPAA, GDPR, and FDA).
ISBN: 9798868820403
Standard No.: 10.1007/979-8-8688-2040-3doiSubjects--Topical Terms:
3217048
Internet of things
--Security measures.
LC Class. No.: TK5105.8857 / .U33 2025
Dewey Class. No.: 004.678
Design and deploy Microsoft Azure Sentinel for IoMT = enhance iomt cybersecurity operations with intelligent analytics /
LDR
:03359nmm a22003255a 4500
001
2422454
003
DE-He213
005
20251120114903.0
006
m d
007
cr nn 008maaau
008
260505s2025 cau s 0 eng d
020
$a
9798868820403
$q
(electronic bk.)
020
$a
9798868820397
$q
(paper)
024
7
$a
10.1007/979-8-8688-2040-3
$2
doi
035
$a
979-8-8688-2040-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8857
$b
.U33 2025
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
004.678
$2
23
090
$a
TK5105.8857
$b
.U18 2025
100
1
$a
Udayakumar, Puthiyavan.
$3
3593854
245
1 0
$a
Design and deploy Microsoft Azure Sentinel for IoMT
$h
[electronic resource] :
$b
enhance iomt cybersecurity operations with intelligent analytics /
$c
by Puthiyavan Udayakumar, Dr. R Anandan.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xxiv, 354 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Get Started with Microsoft Sentinel and IoMT -- Chapter 2: Architecting and Deploying Microsoft Sentinel -- Chapter 3: Engineering Microsoft Sentinel for Security Operations -- Chapter 4: Threat Detection, Investigation, and Response.
520
$a
Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments. The book guides you to deploy, and optimize Microsoft Sentinel specifically for IoMT environments, guaranteeing the protection of critical medical systems and patient data. The book starts with introducing the fundamental concepts of Sentinel, its role in securing IoMT, and the latest advancements in healthcare cybersecurity. Architecting and Deploying Microsoft Sentinel focuses on designing a Sentinel workspace tailored for IoMT, integrating medical device logs, and applying Zero Trust principles to secure connected healthcare environments. Engineering Microsoft Sentinel for Security Operations explores how security engineers can configure analytics, automate threat response, and optimize Security Operations Center (SOC) workflows to mitigate IoMT-specific threats, such as ransomware attacks on medical devices or unauthorized access to patient records. Finally, Threat Detection, Investigation, and Response provides practical techniques for security analysts, including crafting detection rules for IoMT anomalies, investigating incidents involving medical devices, and leveraging Kusto Query Language (KQL) to proactively hunt for threats in healthcare networks. By the end of this book, you will be equipped to design, implement, and operate a comprehensive security framework for IoMT environments using Microsoft Sentinel. What You Will Learn: Design and deploy a Microsoft Sentinel workspace tailored specifically for IoMT, including integrating medical device logs. Implementing Zero Trust security principles to safeguard connected healthcare systems. Gain practical skills in creating custom detection rules for IoMT devices, investigating security incidents involving medical systems Understanding compliance with key healthcare regulations (such as HIPAA, GDPR, and FDA).
650
0
$a
Internet of things
$x
Security measures.
$3
3217048
650
0
$a
Medical instruments and apparatus
$x
Technological innovations
$x
Security measures.
$3
3804259
650
0
$a
Microsoft Azure (Computing platform)
$3
3201298
650
1 4
$a
Microsoft.
$3
3593799
650
2 4
$a
Internet of Things.
$3
3538511
700
1
$a
Anandan, R.
$3
3597832
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-2040-3
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9522952
電子資源
11.線上閱覽_V
電子書
EB TK5105.8857 .U33 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login