Microsoft Azure security center:
Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Microsoft Press
[2018]
[Place of publication not identified] Pearson Education [2018] |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781509307081/?ar |
Zusammenfassung: | Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: " Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management " Master a new security paradigm for a world without traditional perimeters " Gain visibility and control to secure compute, network, storage, and application workloads " Incorporate Azure Security Center into your security operations center " Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions " Adapt Azure Security Center's built-in policies and definitions for your organization " Perform security assessments and implement Azure Security Center recommendations " Use incident response features to detect, investigate, and address threats " Create high-fidelity fusion alerts to focus attention on your most urgent security issues " Implement application whitelisting and just-in-time VM access " Monitor user behavior and access, and investigate compromised or misused credentials " Customize and perform operating system security baseline assessments " Leverage integrated threat intelligence to identify known bad actors |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed June 22, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781509307081 1509307087 1509307036 9781509307036 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047635460 | ||
003 | DE-627-1 | ||
005 | 20240228120522.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781509307081 |9 978-1-5093-0708-1 | ||
020 | |a 1509307087 |9 1-5093-0708-7 | ||
020 | |a 1509307036 |9 1-5093-0703-6 | ||
020 | |a 9781509307036 |9 978-1-5093-0703-6 | ||
035 | |a (DE-627-1)047635460 | ||
035 | |a (DE-599)KEP047635460 | ||
035 | |a (ORHE)9781509307081 | ||
035 | |a (DE-627-1)047635460 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Diogenes, Yuri |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Microsoft Azure security center |c Yuri Diogenes, Dr. Thomas W. Shinder |
246 | 3 | 3 | |a Azure security center |
264 | 1 | |a [Place of publication not identified] |b Microsoft Press |c [2018] | |
264 | 1 | |a [Place of publication not identified] |b Pearson Education |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed June 22, 2018) | ||
520 | |a Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: " Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management " Master a new security paradigm for a world without traditional perimeters " Gain visibility and control to secure compute, network, storage, and application workloads " Incorporate Azure Security Center into your security operations center " Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions " Adapt Azure Security Center's built-in policies and definitions for your organization " Perform security assessments and implement Azure Security Center recommendations " Use incident response features to detect, investigate, and address threats " Create high-fidelity fusion alerts to focus attention on your most urgent security issues " Implement application whitelisting and just-in-time VM access " Monitor user behavior and access, and investigate compromised or misused credentials " Customize and perform operating system security baseline assessments " Leverage integrated threat intelligence to identify known bad actors | ||
630 | 2 | 0 | |a Windows Azure |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Application software |x Development | |
650 | 0 | |a Cloud computing | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Windows Azure | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Shinder, Thomas W. |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781509307081/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047635460 |
---|---|
_version_ | 1821494869706670080 |
adam_text | |
any_adam_object | |
author | Diogenes, Yuri Shinder, Thomas W. |
author_facet | Diogenes, Yuri Shinder, Thomas W. |
author_role | aut aut |
author_sort | Diogenes, Yuri |
author_variant | y d yd t w s tw tws |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047635460 (DE-599)KEP047635460 (ORHE)9781509307081 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04101cam a22006012 4500</leader><controlfield tag="001">ZDB-30-ORH-047635460</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120522.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509307081</subfield><subfield code="9">978-1-5093-0708-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1509307087</subfield><subfield code="9">1-5093-0708-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1509307036</subfield><subfield code="9">1-5093-0703-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509307036</subfield><subfield code="9">978-1-5093-0703-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047635460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047635460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781509307081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047635460</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft Azure security center</subfield><subfield code="c">Yuri Diogenes, Dr. Thomas W. Shinder</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Azure security center</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Microsoft Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson Education</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed June 22, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: " Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management " Master a new security paradigm for a world without traditional perimeters " Gain visibility and control to secure compute, network, storage, and application workloads " Incorporate Azure Security Center into your security operations center " Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions " Adapt Azure Security Center's built-in policies and definitions for your organization " Perform security assessments and implement Azure Security Center recommendations " Use incident response features to detect, investigate, and address threats " Create high-fidelity fusion alerts to focus attention on your most urgent security issues " Implement application whitelisting and just-in-time VM access " Monitor user behavior and access, and investigate compromised or misused credentials " Customize and perform operating system security baseline assessments " Leverage integrated threat intelligence to identify known bad actors</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shinder, Thomas W.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781509307081/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047635460 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:14Z |
institution | BVB |
isbn | 9781509307081 1509307087 1509307036 9781509307036 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Microsoft Press Pearson Education |
record_format | marc |
spelling | Diogenes, Yuri VerfasserIn aut Microsoft Azure security center Yuri Diogenes, Dr. Thomas W. Shinder Azure security center [Place of publication not identified] Microsoft Press [2018] [Place of publication not identified] Pearson Education [2018] ©2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed June 22, 2018) Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: " Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management " Master a new security paradigm for a world without traditional perimeters " Gain visibility and control to secure compute, network, storage, and application workloads " Incorporate Azure Security Center into your security operations center " Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions " Adapt Azure Security Center's built-in policies and definitions for your organization " Perform security assessments and implement Azure Security Center recommendations " Use incident response features to detect, investigate, and address threats " Create high-fidelity fusion alerts to focus attention on your most urgent security issues " Implement application whitelisting and just-in-time VM access " Monitor user behavior and access, and investigate compromised or misused credentials " Customize and perform operating system security baseline assessments " Leverage integrated threat intelligence to identify known bad actors Windows Azure Computer networks Security measures Application software Development Cloud computing Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels d'application ; Développement Infonuagique Sécurité informatique Application software ; Development Computer networks ; Security measures Shinder, Thomas W. VerfasserIn aut |
spellingShingle | Diogenes, Yuri Shinder, Thomas W. Microsoft Azure security center Windows Azure Computer networks Security measures Application software Development Cloud computing Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels d'application ; Développement Infonuagique Sécurité informatique Application software ; Development Computer networks ; Security measures |
title | Microsoft Azure security center |
title_alt | Azure security center |
title_auth | Microsoft Azure security center |
title_exact_search | Microsoft Azure security center |
title_full | Microsoft Azure security center Yuri Diogenes, Dr. Thomas W. Shinder |
title_fullStr | Microsoft Azure security center Yuri Diogenes, Dr. Thomas W. Shinder |
title_full_unstemmed | Microsoft Azure security center Yuri Diogenes, Dr. Thomas W. Shinder |
title_short | Microsoft Azure security center |
title_sort | microsoft azure security center |
topic | Windows Azure Computer networks Security measures Application software Development Cloud computing Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels d'application ; Développement Infonuagique Sécurité informatique Application software ; Development Computer networks ; Security measures |
topic_facet | Windows Azure Computer networks Security measures Application software Development Cloud computing Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels d'application ; Développement Infonuagique Sécurité informatique Application software ; Development Computer networks ; Security measures |
work_keys_str_mv | AT diogenesyuri microsoftazuresecuritycenter AT shinderthomasw microsoftazuresecuritycenter AT diogenesyuri azuresecuritycenter AT shinderthomasw azuresecuritycenter |