Cargando…

Mastering Azure security : keeping your Microsoft Azure workloads safe /

Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents Key Features Learn how to secure your Azure cloud workloads across applications and networks Protect your Azure infrastructure from cyber attacks Discover tips and techniques for implementi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Toroman, Mustafa (Autor), Janetscheck, Tom (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2022.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_on1313909356
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220504s2022 enk o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d NLW  |d OCLCF  |d N$T  |d UKMGB  |d OCLCQ  |d IEEEE 
015 |a GBC2H8841  |2 bnb 
016 7 |a 020547643  |2 Uk 
019 |a 1346260332 
020 |a 9781803242927  |q (electronic bk.) 
020 |a 1803242922  |q (electronic bk.) 
020 |z 9781803238555 
029 1 |a AU@  |b 000071968494 
029 1 |a UKMGB  |b 020547643 
035 |a (OCoLC)1313909356  |z (OCoLC)1346260332 
037 |a 9781803238555  |b O'Reilly Media 
037 |a 10162529  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220504 
049 |a UAMI 
100 1 |a Toroman, Mustafa,  |e author. 
245 1 0 |a Mastering Azure security :  |b keeping your Microsoft Azure workloads safe /  |c Mustafa Toroman, Tom Janetscheck. 
250 |a Second edition. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2022. 
300 |a 1 online resource (320 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents Key Features Learn how to secure your Azure cloud workloads across applications and networks Protect your Azure infrastructure from cyber attacks Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices Book Description Security is integrated into every cloud, but this makes users put their guard down as they take cloud security for granted. Although the cloud provides higher security, keeping their resources secure is one of the biggest challenges many organizations face as threats are constantly evolving. Microsoft Azure offers a shared responsibility model that can address any challenge with the right approach. Revised to cover product updates up to early 2022, this book will help you explore a variety of services and features from Microsoft Azure that can help you overcome challenges in cloud security. You'll start by learning the most important security concepts in Azure, their implementation, and then advance to understanding how to keep resources secure. The book will guide you through the tools available for monitoring Azure security and enforcing security and governance the right way. You'll also explore tools to detect threats before they can do any real damage and those that use machine learning and AI to analyze your security logs and detect anomalies. By the end of this cloud security book, you'll have understood cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure. What you will learn Become well-versed with cloud security concepts Get the hang of managing cloud identities Understand the zero-trust approach Adopt the Azure security cloud infrastructure Protect and encrypt your data Grasp Azure network security concepts Discover how to keep cloud resources secure Implement cloud governance with security policies and rules Who this book is for This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. 
505 0 |a Table of Contents An Introduction to Azure Security Governance and Security Managing Cloud Identities Azure Network Security Azure KeyVault Data Security Microsoft Defender for Cloud Microsoft Sentinel Security Best Practices. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Microsoft Azure (Computing platform) 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cloud computing. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Intranets & Extranets.  |2 bisacsh 
650 7 |a Cloud computing.  |2 fast  |0 (OCoLC)fst01745899 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Microsoft Azure (Computing platform)  |2 fast  |0 (OCoLC)fst01940548 
700 1 |a Janetscheck, Tom,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781803238555/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 3216750 
994 |a 92  |b IZTAP