|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_ocn994787567 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
170725s2017 xxu ob 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d N$T
|d EBLCP
|d GW5XE
|d NJR
|d N$T
|d UAB
|d ESU
|d AZU
|d UPM
|d OCLCF
|d COO
|d OH1
|d IDB
|d OCLCQ
|d MERER
|d OCLCQ
|d IOG
|d OCLCO
|d MERUC
|d OCLCA
|d SNK
|d K6U
|d LIV
|d U3W
|d D6H
|d CAUOI
|d OCLCQ
|d KSU
|d VT2
|d WYU
|d OCLCQ
|d UMI
|d S9I
|d STF
|d UKMGB
|d TOH
|d G3B
|d AUD
|d OCLCQ
|d OCLCO
|d ERF
|d ADU
|d UHL
|d LEATE
|d OCLCQ
|d SFB
|d OCLCQ
|d UKAHL
|d BRF
|d DCT
|d SINLB
|d AU@
|d LQU
|d OCLCQ
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBB8M4505
|2 bnb
|
016 |
7 |
|
|a 019139995
|2 Uk
|
019 |
|
|
|a 994221108
|a 995112991
|a 1002361055
|a 1005757881
|a 1012000456
|a 1015662952
|a 1048246030
|a 1062728174
|a 1066582320
|a 1066602380
|a 1086459329
|a 1112884262
|a 1113795864
|a 1122814835
|a 1125912713
|a 1129374404
|a 1135629614
|a 1153026053
|a 1162298492
|a 1198253645
|a 1204065952
|a 1206409152
|a 1229945589
|a 1264847755
|
020 |
|
|
|a 9781484227404
|q (electronic bk.)
|
020 |
|
|
|a 1484227409
|q (electronic bk.)
|
020 |
|
|
|z 9781484227398
|
020 |
|
|
|z 1484227395
|
024 |
7 |
|
|a 10.1007/978-1-4842-2740-4
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4842-2
|
029 |
1 |
|
|a AU@
|b 000060623662
|
029 |
1 |
|
|a AU@
|b 000060645313
|
029 |
1 |
|
|a AU@
|b 000066230723
|
029 |
1 |
|
|a CHNEW
|b 000966679
|
029 |
1 |
|
|a CHVBK
|b 49524533X
|
029 |
1 |
|
|a UKMGB
|b 019139995
|
029 |
1 |
|
|a AU@
|b 000069023776
|
035 |
|
|
|a (OCoLC)994787567
|z (OCoLC)994221108
|z (OCoLC)995112991
|z (OCoLC)1002361055
|z (OCoLC)1005757881
|z (OCoLC)1012000456
|z (OCoLC)1015662952
|z (OCoLC)1048246030
|z (OCoLC)1062728174
|z (OCoLC)1066582320
|z (OCoLC)1066602380
|z (OCoLC)1086459329
|z (OCoLC)1112884262
|z (OCoLC)1113795864
|z (OCoLC)1122814835
|z (OCoLC)1125912713
|z (OCoLC)1129374404
|z (OCoLC)1135629614
|z (OCoLC)1153026053
|z (OCoLC)1162298492
|z (OCoLC)1198253645
|z (OCoLC)1204065952
|z (OCoLC)1206409152
|z (OCoLC)1229945589
|z (OCoLC)1264847755
|
037 |
|
|
|a CL0501000007
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UMP
|2 bicssc
|
072 |
|
7 |
|a UMP
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
082 |
0 |
4 |
|a 004
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Copeland, Marshall.
|
245 |
1 |
0 |
|a Cyber security on Azure :
|b an IT professionals guide to Microsoft Azure security center /
|c Marshall Copeland.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Apress,
|c 2017.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
0 |
|
|a ITpro collection
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures.
|
505 |
0 |
|
|a Part I: All Business Roles.- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business.- Chapter 2: Azure Security Center Cost Model.- Part II: Cloud Security Operations.- Chapter 3: Azure Security Center Getting Started.- Chapter 4: Azure Security Center Configuration.- Chapter 5: Azure Security Center Scenarios.- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Azure SQL Database.
|
630 |
0 |
7 |
|a Microsoft Azure SQL Database.
|2 fast
|0 (OCoLC)fst01937996
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Microsoft programming.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Print version:
|a Copeland, Marshall.
|t Cyber security on Azure.
|d [Place of publication not identified] : Apress, 2017
|z 1484227395
|z 9781484227398
|w (OCoLC)983405070
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484227404/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35288687
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4920972
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1558534
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14706512
|
994 |
|
|
|a 92
|b IZTAP
|