Cargando…

Design and deploy a secure Azure environment : mapping the NIST cybersecurity framework to Azure services /

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Udayakumar, Puthiyavan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2023]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1396251938
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230908s2023 nyua o 001 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d GW5XE  |d EBLCP  |d ORMDA 
019 |a 1396696792 
020 |a 9781484296783  |q (electronic bk.) 
020 |a 1484296788  |q (electronic bk.) 
020 |z 148429677X 
020 |z 9781484296776 
024 7 |a 10.1007/978-1-4842-9678-3  |2 doi 
029 1 |a AU@  |b 000075120341 
035 |a (OCoLC)1396251938  |z (OCoLC)1396696792 
037 |a 9781484296783  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230913 
049 |a UAMI 
100 1 |a Udayakumar, Puthiyavan,  |e author. 
245 1 0 |a Design and deploy a secure Azure environment :  |b mapping the NIST cybersecurity framework to Azure services /  |c Puthiyavan Udayakumar. 
264 1 |a New York :  |b Apress,  |c [2023] 
264 4 |c Ã2023 
300 |a 1 online resource (xxvii, 695 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF. The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint. After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF. What You Will Learn Design and deploy security for infrastructure, data, and applications Design and deploy an identify solution Design and deploy a protect solution Design and deploy a detect solution Design and deploy a respond solution Design and deploy a recover solution. 
505 0 |a Chapter 1: Getting Started with Azure Security -- Chapter 2: Design and Deploy Security for Infrastructure, Data, and Applications -- Chapter 3: Design and Deploy an Identify Solution -- Chapter 4: Design and Deploy a Protect Solution, Part I -- Chap7: Design and Deploy a Detect Solution -- Chapter 8: Design and Deploy a Respond Solution -- Chapter 9: Design and Deploy a Recover Solution. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed September 13, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Microsoft Azure (Computing platform)  |x Security measures. 
776 0 8 |i Print version:  |z 148429677X  |z 9781484296776  |w (OCoLC)1385450161 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484296783/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 305685664 
938 |a YBP Library Services  |b YANK  |n 305685664 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30733392 
994 |a 92  |b IZTAP