Designing and developing secure Azure solutions:
As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Pearson Education
[2023]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780137908790/?ar |
Zusammenfassung: | As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (528 Seiten) Illustrationen |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-083657657 | ||
003 | DE-627-1 | ||
005 | 20240228121851.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230111s2023 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)083657657 | ||
035 | |a (DE-599)KEP083657657 | ||
035 | |a (ORHE)9780137908790 | ||
035 | |a (DE-627-1)083657657 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.67/82 |2 23/eng/20221206 | |
100 | 1 | |a Howard, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Designing and developing secure Azure solutions |c Michael Howard, Heinrich Gantenbein, Simone Curzi |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Pearson Education |c [2023] | |
300 | |a 1 Online-Ressource (528 Seiten) |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance. | ||
630 | 2 | 0 | |a Windows Azure |
650 | 0 | |a Cloud computing | |
650 | 0 | |a Application software |x Design | |
650 | 4 | |a Windows Azure | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a Cloud computing | |
700 | 1 | |a Gantenbein, Heinrich |e VerfasserIn |4 aut | |
700 | 1 | |a Curzi, Simone |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780137908790/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-083657657 |
---|---|
_version_ | 1831287035029094400 |
adam_text | |
any_adam_object | |
author | Howard, Michael Gantenbein, Heinrich Curzi, Simone |
author_facet | Howard, Michael Gantenbein, Heinrich Curzi, Simone |
author_role | aut aut aut |
author_sort | Howard, Michael |
author_variant | m h mh h g hg s c sc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)083657657 (DE-599)KEP083657657 (ORHE)9780137908790 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02254cam a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-083657657</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121851.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230111s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083657657</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP083657657</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780137908790</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)083657657</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23/eng/20221206</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Howard, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Designing and developing secure Azure solutions</subfield><subfield code="c">Michael Howard, Heinrich Gantenbein, Simone Curzi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson Education</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (528 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gantenbein, Heinrich</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Curzi, Simone</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780137908790/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-083657657 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:23:31Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (528 Seiten) Illustrationen |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Pearson Education |
record_format | marc |
spelling | Howard, Michael VerfasserIn aut Designing and developing secure Azure solutions Michael Howard, Heinrich Gantenbein, Simone Curzi [First edition]. [Place of publication not identified] Pearson Education [2023] 1 Online-Ressource (528 Seiten) Illustrationen Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance. Windows Azure Cloud computing Application software Design Infonuagique Gantenbein, Heinrich VerfasserIn aut Curzi, Simone VerfasserIn aut |
spellingShingle | Howard, Michael Gantenbein, Heinrich Curzi, Simone Designing and developing secure Azure solutions Windows Azure Cloud computing Application software Design Infonuagique |
title | Designing and developing secure Azure solutions |
title_auth | Designing and developing secure Azure solutions |
title_exact_search | Designing and developing secure Azure solutions |
title_full | Designing and developing secure Azure solutions Michael Howard, Heinrich Gantenbein, Simone Curzi |
title_fullStr | Designing and developing secure Azure solutions Michael Howard, Heinrich Gantenbein, Simone Curzi |
title_full_unstemmed | Designing and developing secure Azure solutions Michael Howard, Heinrich Gantenbein, Simone Curzi |
title_short | Designing and developing secure Azure solutions |
title_sort | designing and developing secure azure solutions |
topic | Windows Azure Cloud computing Application software Design Infonuagique |
topic_facet | Windows Azure Cloud computing Application software Design Infonuagique |
work_keys_str_mv | AT howardmichael designinganddevelopingsecureazuresolutions AT gantenbeinheinrich designinganddevelopingsecureazuresolutions AT curzisimone designinganddevelopingsecureazuresolutions |