Cargando…

Azure Security Cookbook Practical Recipes for Securing Azure Resources and Operations /

Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microso...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Miles, Steve (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1371754303
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230304s2023 enk o 000 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d ORMDA  |d UKAHL  |d OCLCF  |d IEEEE 
019 |a 1371748570 
020 |a 9781804616673 
020 |a 1804616672 
035 |a (OCoLC)1371754303  |z (OCoLC)1371748570 
037 |a 9781804617960  |b O'Reilly Media 
037 |a 10162431  |b IEEE 
050 4 |a TK5105.88813 
082 0 4 |a 005.8  |2 23/eng/20230411 
049 |a UAMI 
100 1 |a Miles, Steve,  |e author. 
245 1 0 |a Azure Security Cookbook  |h [electronic resource] :  |b Practical Recipes for Securing Azure Resources and Operations /  |c Steve Miles. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (372 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Azure Security Features -- Chapter 1: Securing Azure AD Identities -- Introduction to Azure Identity Services -- What is AD? -- Technical requirements -- Reviewing Azure AD Identity Secure Score -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Azure AD tenant Identity and Access Management -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing Azure AD Password Protection -- Getting ready -- How to do it... 
505 8 |a How it works... -- See also -- Implementing a Self-Service Password Reset -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Azure AD security defaults -- Getting ready -- How to do it.... -- How it works... -- See also -- Implementing Azure AD multi-factor authentication -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Conditional Access policies -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing the Azure AD Identity Protection service -- Getting ready -- How to do it... -- How it works... -- See also 
505 8 |a Implementing Azure AD Privileged Identity Management -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 2: Securing Azure Networks -- Technical requirements -- Implementing network security groups -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Azure Firewall -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Azure Web Application Firewall -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing Azure DDoS -- Getting ready -- How to do it... -- How it works... -- There's more... 
505 8 |a See also -- Chapter 3: Securing Remote Access -- Technical requirements -- Implementing Azure Network Adapter -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing the Azure Bastion service -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing JIT VM access -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 4: Securing Virtual Machines -- Technical requirements -- Implementing VM Update Management -- Getting ready -- How to do it... -- How it works... -- There's more... 
505 8 |a See also -- Implementing VM Microsoft Antimalware -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing VM Azure Disk Encryption -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Securing Azure SQL Databases -- Technical requirements -- Implementing a service-level IP firewall -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing a private endpoint -- Getting ready -- How to do it... -- How it works.... -- There's more... -- See also -- Implementing Azure AD authentication and authorization -- Getting ready 
500 |a How to do it... 
520 |a Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microsoft Defender for Cloud and Microsoft Sentinel Work with real-world examples of Azure Platform security capabilities to develop skills quickly Book Description With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources. What you will learn Find out how to implement Azure security features and tools Understand how to provide actionable insights into security incidents Gain confidence in securing Azure resources and operations Shorten your time to value for applying learned skills in real-world cases Follow best practices and choices based on informed decisions Better prepare for Microsoft certification with a security element Who this book is for This book is for Azure security professionals, Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Microsoft Defender for Cloud and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. This book is also beneficial for those aiming to take Microsoft certification exams with a security element or focus. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Microsoft Azure (Computing platform) 
650 0 |a Computer security. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Microsoft Azure (Computing platform)  |2 fast  |0 (OCoLC)fst01940548 
776 0 8 |i Print version:  |a Miles, Steve  |t Azure Security Cookbook  |d Birmingham : Packt Publishing, Limited,c2023 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781804617960/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41151088 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30397251 
938 |a YBP Library Services  |b YANK  |n 304662160 
994 |a 92  |b IZTAP