Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy
(eBook)
Description
Also in this Series
More Details
Notes
Reviews from GoodReads
Citations
Sapkar, T., & Shingornikar, S. (2022). Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy ([First edition].). IBM Blueprint.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Sapkar, Tejas and Shashank, Shingornikar. 2022. Proactive Early Threat Detection and Securing SQL Database With IBM QRadar and IBM Spectrum Copy Data Management, Using IBM FlashSystem Safeguarded Copy. IBM Blueprint.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Sapkar, Tejas and Shashank, Shingornikar. Proactive Early Threat Detection and Securing SQL Database With IBM QRadar and IBM Spectrum Copy Data Management, Using IBM FlashSystem Safeguarded Copy IBM Blueprint, 2022.
MLA Citation, 9th Edition (style guide)Sapkar, Tejas,, and Shashank Shingornikar. Proactive Early Threat Detection and Securing SQL Database With IBM QRadar and IBM Spectrum Copy Data Management, Using IBM FlashSystem Safeguarded Copy [First edition]., IBM Blueprint, 2022.
Staff View
Grouping Information
Grouped Work ID | f0454f4b-889b-a360-909b-768fb4c799a3-eng |
---|---|
Full title | proactive early threat detection and securing sql database with ibm qradar and ibm spectrum copy data management using ibm flashsystem safeguarded copy |
Author | sapkar tejas |
Grouping Category | book |
Last Update | 2024-09-06 16:31:08PM |
Last Indexed | 2024-09-21 04:52:47AM |
Book Cover Information
Image Source | coce_google_books |
---|---|
First Loaded | Sep 11, 2024 |
Last Used | Sep 11, 2024 |
Marc Record
First Detected | Jul 29, 2024 04:07:51 PM |
---|---|
Last File Modification Time | Sep 06, 2024 04:53:40 PM |
MARC Record
LEADER | 02418cam a22003617i 4500 | ||
---|---|---|---|
001 | on1348103436 | ||
003 | OCoLC | ||
005 | 20240830103855.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 221018s2022 xx a o 000 0 eng d | ||
020 | |a 0738460850|q (electronic bk.) | ||
020 | |a 9780738460857|q (electronic bk.) | ||
035 | |a (OCoLC)1348103436 | ||
037 | |a 9780738460857|b O'Reilly Media | ||
040 | |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCF|d OCLCO | ||
049 | |a FMGA | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8|2 23/eng/20221018 |
100 | 1 | |a Sapkar, Tejas,|e author. | |
245 | 1 | 0 | |a Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy /|c Tejas Sapkar, Shashank Shingornikar. |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] :|b IBM Blueprint,|c 2022. | |
300 | |a 1 online resource (34 pages) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
520 | |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions. | ||
650 | 0 | |a Cyber intelligence (Computer security)|0 http://id.loc.gov/authorities/subjects/sh2011005959 | |
650 | 0 | |a Computer networks|x Security measures.|0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Internet|x Security measures. | |
700 | 1 | |a Shingornikar, Shashank,|e author. | |
856 | 4 | 0 | |u https://www.aclib.us/OReilly |