Cargando…

Understanding Log Analytics at Scale, 2nd Edition /

Using log analytics provides organizations with powerful and necessary capabilities for IT security. By analyzing log data, you can drive critical business outcomes, such as identifying security threats or opportunities to build new products. Log analytics also helps improve business efficiency, app...

Descripción completa

Detalles Bibliográficos
Autores principales: Gillespie, Matt (Autor), Givre, Charles (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: O'Reilly Media, Inc., 2021.
Edición:2nd edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1258256117
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070521s2021 xx go 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d OCLCO  |d AU@  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO 
019 |a 1256713488 
020 |a 9781098104269 
020 |a 1098104269 
020 |z 9781098104252 
024 8 |a 9781098104269 
029 1 |a AU@  |b 000069347168 
035 |a (OCoLC)1258256117  |z (OCoLC)1256713488 
049 |a UAMI 
100 1 |a Gillespie, Matt,  |e author. 
245 1 0 |a Understanding Log Analytics at Scale, 2nd Edition /  |c Gillespie, Matt. 
250 |a 2nd edition. 
264 1 |b O'Reilly Media, Inc.,  |c 2021. 
300 |a 1 online resource (82 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 74.99 
520 |a Using log analytics provides organizations with powerful and necessary capabilities for IT security. By analyzing log data, you can drive critical business outcomes, such as identifying security threats or opportunities to build new products. Log analytics also helps improve business efficiency, application, infrastructure, and uptime. In the second edition of this report, data architects and IT infrastructure leads will learn how to get up to speed on log data, log analytics, and log management. Log data, the list of recorded events from software and hardware, typically includes the IP address, time of event, date of event, and more. You'll explore how proactively planned data storage and delivery extends enterprise IT capabilities critical to security analytics deployments. Explore what log analytics is--and why log data is so vital Learn how log analytics helps organizations achieve better business outcomes Use log analytics to address specific business problems Examine the current state of log analytics, including common issues Make the right storage deployments for log analytics use cases Understand how log analytics will evolve in the future With this in-depth report, you'll be able to identify the points your organization needs to consider to achieve successful business outcomes from your log data. 
542 |f Copyright © O'Reilly Media, Inc. 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed May 10, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
700 1 |a Givre, Charles,  |e author. 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098104269/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP