Microsoft Azure Security Infrastructure / IT Best Practices - Microsoft Press (ePub)
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.
Implement maximum control, security, and compliance processes in...
14 DeutschlandCard Punkte sammeln
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure,1/e three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve.
Three Microsoft Azure experts show you how to:
. Understand cloud security boundaries and responsibilities
. Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection
. Explore Azure's defense-in-depth security architecture
. Use Azure network security patterns and best practices
. Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security
. Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines
. Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information
. Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite
. Effectively model threats and plan protection for IoT systems
. Use Azure security tools for operations, incident response, and forensic investigation
DR. THOMAS SHINDER is a program manager in Azure Security Engineering and a 20-year veteran in IT security. Tom is best known for his work with ISA Server and TMG, publishing nine books on those topics. He was also the leading voice at ISAserver.org. After joining Microsoft in 2009, Tom spent time on the UAG DirectAccess team and then took a 3-year vacation from security to be a cloud infrastructure specialist and architect. He's now back where he belongs in security, and spends a good deal of time hugging his Azure Security Center console and hiding his secrets in Azure Key Vault.
DEBRA LITTLEJOHN SHINDER, MCSE, is a former police officer and police academy instructor who is self-employed as a technol¿ogy consultant, trainer, and writer, specializing in network and cloud security. She has authored a number of books, including Scene of the Cybercrime: Computer Forensics Handbook (Syngress Publishing, 2002) and Computer Networking Essentials (Cisco Press, 2001). She has co-authored more than 20 additional books and worked as a tech editor, developmental editor, and contributor to more than 15 books. Deb is a lead author for WindowSecurity.com and
- Autoren: Yuri Diogenes , Tom Shinder , Debra Shinder
- 2016, 1. Auflage, 224 Seiten, Englisch
- Verlag: Pearson ITP
- ISBN-10: 1509304045
- ISBN-13: 9781509304042
- Erscheinungsdatum: 19.08.2016
Abhängig von Bildschirmgröße und eingestellter Schriftgröße kann die Seitenzahl auf Ihrem Lesegerät variieren.
- Dateiformat: ePub
- Mit Kopierschutz
- Vorlesefunktion
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Microsoft Azure Security Infrastructure / IT Best Practices - Microsoft Press".
Kommentar verfassen