Microsoft Azure security infrastructure:
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to pre...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Redmond, Washington
Microsoft Press
[2016]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781509304028/?ar |
Zusammenfassung: | Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services - and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement - so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities; Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection; Explore Azure's defense-in-depth security architecture; Use Azure network security patterns and best practices; Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security; Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines; Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information; Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite; Effectively model threats and plan protection for IoT systems; Use Azure security tools for operations, incident response, and forensic investigation. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 8, 2016) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781509304042 1509304045 9781509304028 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047635150 | ||
003 | DE-627-1 | ||
005 | 20240228120144.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781509304042 |c electronic bk. |9 978-1-5093-0404-2 | ||
020 | |a 1509304045 |c electronic bk. |9 1-5093-0404-5 | ||
020 | |a 9781509304028 |9 978-1-5093-0402-8 | ||
035 | |a (DE-627-1)047635150 | ||
035 | |a (DE-599)KEP047635150 | ||
035 | |a (ORHE)9781509304028 | ||
035 | |a (DE-627-1)047635150 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 004.67/82 |2 23 | |
100 | 1 | |a Diogenes, Yuri |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Microsoft Azure security infrastructure |c Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder |
246 | 3 | 3 | |a Azure security infrastructure |
264 | 1 | |a Redmond, Washington |b Microsoft Press |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 8, 2016) | ||
520 | |a Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services - and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement - so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities; Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection; Explore Azure's defense-in-depth security architecture; Use Azure network security patterns and best practices; Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security; Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines; Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information; Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite; Effectively model threats and plan protection for IoT systems; Use Azure security tools for operations, incident response, and forensic investigation. | ||
630 | 2 | 0 | |a Windows Azure |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Cloud computing | |
650 | 4 | |a Windows Azure | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a COMPUTERS ; Computer Literacy | |
650 | 4 | |a COMPUTERS ; Computer Science | |
650 | 4 | |a COMPUTERS ; Data Processing | |
650 | 4 | |a COMPUTERS ; Hardware ; General | |
650 | 4 | |a COMPUTERS ; Information Technology | |
650 | 4 | |a COMPUTERS ; Machine Theory | |
650 | 4 | |a COMPUTERS ; Reference | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Cloud computing | |
700 | 1 | |a Shinder, Thomas W. |e VerfasserIn |4 aut | |
700 | 1 | |a Shinder, Debra Littlejohn |e VerfasserIn |4 aut | |
776 | 1 | |z 150930357X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 150930357X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781509304028/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047635150 |
---|---|
_version_ | 1821494869787410432 |
adam_text | |
any_adam_object | |
author | Diogenes, Yuri Shinder, Thomas W. Shinder, Debra Littlejohn |
author_facet | Diogenes, Yuri Shinder, Thomas W. Shinder, Debra Littlejohn |
author_role | aut aut aut |
author_sort | Diogenes, Yuri |
author_variant | y d yd t w s tw tws d l s dl dls |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047635150 (DE-599)KEP047635150 (ORHE)9781509304028 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04300cam a22006972 4500</leader><controlfield tag="001">ZDB-30-ORH-047635150</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120144.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509304042</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-5093-0404-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1509304045</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-5093-0404-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509304028</subfield><subfield code="9">978-1-5093-0402-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047635150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047635150</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781509304028</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047635150</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Azure security infrastructure</subfield><subfield code="c">Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Azure security infrastructure</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Redmond, Washington</subfield><subfield code="b">Microsoft Press</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 8, 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services - and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement - so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities; Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection; Explore Azure's defense-in-depth security architecture; Use Azure network security patterns and best practices; Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security; Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines; Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information; Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite; Effectively model threats and plan protection for IoT systems; Use Azure security tools for operations, incident response, and forensic investigation.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Literacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Hardware ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Information Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Machine Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Reference</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Debra Littlejohn</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">150930357X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">150930357X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781509304028/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047635150 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:14Z |
institution | BVB |
isbn | 9781509304042 1509304045 9781509304028 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Microsoft Press |
record_format | marc |
spelling | Diogenes, Yuri VerfasserIn aut Microsoft Azure security infrastructure Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder Azure security infrastructure Redmond, Washington Microsoft Press [2016] ©2016 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 8, 2016) Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services - and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement - so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities; Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection; Explore Azure's defense-in-depth security architecture; Use Azure network security patterns and best practices; Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security; Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines; Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information; Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite; Effectively model threats and plan protection for IoT systems; Use Azure security tools for operations, incident response, and forensic investigation. Windows Azure Application software Development Cloud computing Logiciels d'application ; Développement Infonuagique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Application software ; Development Shinder, Thomas W. VerfasserIn aut Shinder, Debra Littlejohn VerfasserIn aut 150930357X Erscheint auch als Druck-Ausgabe 150930357X |
spellingShingle | Diogenes, Yuri Shinder, Thomas W. Shinder, Debra Littlejohn Microsoft Azure security infrastructure Windows Azure Application software Development Cloud computing Logiciels d'application ; Développement Infonuagique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Application software ; Development |
title | Microsoft Azure security infrastructure |
title_alt | Azure security infrastructure |
title_auth | Microsoft Azure security infrastructure |
title_exact_search | Microsoft Azure security infrastructure |
title_full | Microsoft Azure security infrastructure Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder |
title_fullStr | Microsoft Azure security infrastructure Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder |
title_full_unstemmed | Microsoft Azure security infrastructure Yuri Diogenes, Dr. Thomas W. Shinder, Debra Littlejohn Shinder |
title_short | Microsoft Azure security infrastructure |
title_sort | microsoft azure security infrastructure |
topic | Windows Azure Application software Development Cloud computing Logiciels d'application ; Développement Infonuagique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Application software ; Development |
topic_facet | Windows Azure Application software Development Cloud computing Logiciels d'application ; Développement Infonuagique COMPUTERS ; Computer Literacy COMPUTERS ; Computer Science COMPUTERS ; Data Processing COMPUTERS ; Hardware ; General COMPUTERS ; Information Technology COMPUTERS ; Machine Theory COMPUTERS ; Reference Application software ; Development |
work_keys_str_mv | AT diogenesyuri microsoftazuresecurityinfrastructure AT shinderthomasw microsoftazuresecurityinfrastructure AT shinderdebralittlejohn microsoftazuresecurityinfrastructure AT diogenesyuri azuresecurityinfrastructure AT shinderthomasw azuresecurityinfrastructure AT shinderdebralittlejohn azuresecurityinfrastructure |