Cargando…

Microsoft Azure security infrastructure /

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to pre...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Diogenes, Yuri (Autor), Shinder, Thomas W. (Autor), Shinder, Debra Littlejohn (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Redmond, Washington : Microsoft Press, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn958144682
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160909s2016 waua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d OCLCF  |d STF  |d COO  |d DEBBG  |d DEBSZ  |d N$T  |d YDX  |d REB  |d UOK  |d CEF  |d KSU  |d VT2  |d OCLCQ  |d WYU  |d C6I  |d UAB  |d UKAHL  |d CNCEN  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1005188584 
020 |a 9781509304042  |q (electronic bk.) 
020 |a 1509304045  |q (electronic bk.) 
020 |z 9781509304028 
020 |z 1509304029 
020 |z 150930357X 
020 |z 9781509303571 
029 1 |a DEBBG  |b BV043970296 
029 1 |a DEBSZ  |b 485807556 
029 1 |a GBVCP  |b 876247982 
029 1 |a AU@  |b 000067103550 
035 |a (OCoLC)958144682  |z (OCoLC)1005188584 
037 |a CL0500000781  |b Safari Books Online 
050 4 |a QA76.76.A65 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.67/82  |2 23 
049 |a UAMI 
100 1 |a Diogenes, Yuri,  |e author. 
245 1 0 |a Microsoft Azure security infrastructure /  |c Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder. 
246 3 0 |a Azure security infrastructure 
264 1 |a Redmond, Washington :  |b Microsoft Press,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed September 8, 2016). 
504 |a Includes bibliographical references and index. 
520 |a Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services - and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement - so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities; Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection; Explore Azure's defense-in-depth security architecture; Use Azure network security patterns and best practices; Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security; Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines; Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information; Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite; Effectively model threats and plan protection for IoT systems; Use Azure security tools for operations, incident response, and forensic investigation. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Windows Azure. 
630 0 7 |a Windows Azure  |2 fast 
650 0 |a Application software  |x Development. 
650 0 |a Cloud computing. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Infonuagique. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Cloud computing  |2 fast 
700 1 |a Shinder, Thomas W.,  |e author. 
700 1 |a Shinder, Debra Littlejohn,  |e author. 
776 0 8 |i Print version:  |a Diogenes, Yuri.  |t Microsoft Azure security infrastructure.  |d ©2016  |z 150930357X  |z 9781509303571  |w (OCoLC)947149829 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781509304028/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31705228 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31705229 
938 |a EBSCOhost  |b EBSC  |n 1593428 
938 |a YBP Library Services  |b YANK  |n 14851576 
994 |a 92  |b IZTAP