Cargando…

Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data /

Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solut...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nickel, Jochen (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2019.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1096282968
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190410s2019 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d YDX  |d N$T  |d UKMGB  |d DST  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB9E1106  |2 bnb 
016 7 |a 019286811  |2 Uk 
019 |a 1089494174 
020 |a 9781789131154 
020 |a 1789131154 
020 |z 9781789132304 
020 |z 1789132304 
029 1 |a UKMGB  |b 019286811 
035 |a (OCoLC)1096282968  |z (OCoLC)1089494174 
037 |a CL0501000039  |b Safari Books Online 
050 4 |a QA76.76.A65 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.6782  |2 23 
049 |a UAMI 
100 1 |a Nickel, Jochen,  |e author. 
245 1 0 |a Mastering identity and access management with Microsoft Azure :  |b empower users by managing and protecting identities and data /  |c Jochen Nickel. 
250 |a Second edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2019. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed April 5, 2019). 
500 |a Previous edition published: 2016. 
520 |a Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up?to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Windows Azure. 
630 0 7 |a Windows Azure  |2 fast 
650 0 |a Cloud computing. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Application software  |x Development. 
650 6 |a Infonuagique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Développement. 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Cloud computing  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 1789132304  |z 9781789132304  |w (OCoLC)1089013684 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781789132304/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 2036189 
938 |a YBP Library Services  |b YANK  |n 16096583 
994 |a 92  |b IZTAP