|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1122564766 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
191007s2020 xx a ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780135752050
|
020 |
|
|
|a 0135752051
|
020 |
|
|
|z 9780135752036
|
029 |
1 |
|
|a AU@
|b 000071520514
|
035 |
|
|
|a (OCoLC)1122564766
|
037 |
|
|
|a CL0501000074
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A65
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Diogenes, Yuri,
|e author.
|
245 |
1 |
0 |
|a Microsoft Azure security center /
|c Yuri Diogenes, Dr. Thomas W. Shinder.
|
246 |
3 |
0 |
|a Azure security center
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Microsoft Corporation :
|b Pearson Education,
|c [2020]
|
264 |
|
4 |
|c ©2020
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 4, 2019).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a NOW FULLY UPDATED: high-value Azure Security Center insights, tips, and operational solutions Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key operational scenarios. You'll walk through securing any Azure workload, and optimizing key facets of modern security, from policies and identity to incident response and risk management. Brand-new coverage includes single-click remediation, IoT, improved container security, Azure Sentinel, and more. Whatever your security role, you'll learn how to save hours, days, or even weeks by solving problems in the most efficient and reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments Gain visibility and control to secure all key workloads Incorporate Azure Security Center into your security operations center, and integrate Azure AD Identity Protection Center and third-party solutions Adapt Azure Security Center's built-in policies and definitions for your organization Perform security assessments, and implement Azure Security Center recommendations fast with single-click remediation Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Assess IoT device security with the Azure IoT Hub managed service Monitor user behavior and access, and investigate compromised or misused credentials Integrate Microsoft's new Azure Sentinel Security Information and Event Management (SIEM) platform Customize and perform operating system security baseline assessments About This Book For cloud architects, designers, implementers, operations professionals, and security specialists working in Microsoft Azure cloud or hybrid environments For all IT professionals and decision-makers concerned with the security of Azure environments.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Windows Azure.
|
630 |
0 |
7 |
|a Windows Azure
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Cloud computing
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Shinder, Thomas W.,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780135752050/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|