Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You’ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement–so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve.
Three Microsoft Azure experts show you how to:
• Understand cloud security boundaries and responsibilities
• Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection
• Explore Azure’s defense-in-depth security architecture
• Use Azure network security patterns and best practices
• Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security
• Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines
• Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information
• Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite
• Effectively model threats and plan protection for IoT systems
• Use Azure security tools for operations, incident response, and forensic investigation
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
YURI DIOGENES is a Senior Content Developer on the CSI Enterprise Mobility and Security Team, focusing on enterprise mobility solutions, Azure Security Center, and OMS Security. Previously, Yuri worked at Microsoft as a writer for the Windows Security team and as a Support Escalation Engineer for the CSS Forefront team. He has a Master of Science degree in Cybersecurity Intelligence and Forensics from Utica College and an MBA from FGF in Brazil, and he holds several industry certifications. He is co-author of Enterprise Mobility Suite–Managing BYOD and Company-Owned Devices (Microsoft Press, 2015), Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion (Microsoft Press, 2010), and three other Forefront titles from Microsoft Press.
DR. THOMAS SHINDER is a program manager in Azure Security Engineering and a 20-year veteran in IT security. Tom is best known for his work with ISA Server and TMG, publishing nine books on those topics. He was also the leading voice at ISAserver.org. After joining Microsoft in 2009, Tom spent time on the UAG DirectAccess team and then took a 3-year vacation from security to be a cloud infrastructure specialist and architect. He’s now back where he belongs in security, and spends a good deal of time hugging his Azure Security Center console and hiding his secrets in Azure Key Vault.
DEBRA LITTLEJOHN SHINDER, MCSE, is a former police officer and police academy instructor who is self-employed as a technol¿ogy consultant, trainer, and writer, specializing in network and cloud security. She has authored a number of books, including Scene of the Cybercrime: Computer Forensics Handbook (Syngress Publishing, 2002) and Computer Networking Essentials (Cisco Press, 2001). She has co-authored more than 20 additional books and worked as a tech editor, developmental editor, and contributor to more than 15 books. Deb is a lead author for WindowSecurity.com and WindowsNetworking.com, and a long-time contributor to the GFI Software blog and other technology publications, with more than 1,500 published articles in print magazines and on websites. Deb focuses on Microsoft products, and has been awarded the Microsoft MVP (Most Valuable Professional) award in the field of enterprise security for 14 years in a row. She lives and works in the Dallas-Fort Worth area and has taught law enforcement, computer networking, and security courses at Eastfield College in Mesquite, Texas. She currently sits on the advisory board of the Eastfield Criminal Justice Training Center Police Academy.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00098944701
Anzahl: 1 verfügbar
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00100054768
Anzahl: 3 verfügbar
Anbieter: HPB Inc., Dallas, TX, USA
paperback. Zustand: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_461794160
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G150930357XI4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Phoenix, Phoenix, AZ, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Bestandsnummer des Verkäufers G150930357XI4N00
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. Youll learn how to prepare infrastructure with Microsofts integrated tools, prebuilt templates, and managed servicesand use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. Youll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvementso you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection Explore Azures defense-in-depth security architecture Use Azure network security patterns and best practices Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite Effectively model threats and plan protection for IoT systems Use Azure security tools for operations, incident response, and forensic investigation. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bestandsnummer des Verkäufers GOR009219998
Anzahl: 4 verfügbar
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Bestandsnummer des Verkäufers 10214758-6
Anzahl: 1 verfügbar
Anbieter: MI Re-Tale, Dacula, GA, USA
Paperback. Zustand: Very Good. Very nice book with minor wear. Book ONLY. Bestandsnummer des Verkäufers 210421001
Anzahl: 1 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Bestandsnummer des Verkäufers M0150930357X-G
Anzahl: 1 verfügbar
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Paperback. Zustand: new. Paperback. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. Youll learn how to prepare infrastructure with Microsofts integrated tools, prebuilt templates, and managed servicesand use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. Youll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvementso you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection Explore Azures defense-in-depth security architecture Use Azure network security patterns and best practices Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite Effectively model threats and plan protection for IoT systems Use Azure security tools for operations, incident response, and forensic investigation Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9781509303571