|
|
|
|
LEADER |
02796nam a22003735i 4500 |
001 |
978-1-4842-2740-4 |
003 |
DE-He213 |
005 |
20170812021927.0 |
007 |
cr nn 008mamaa |
008 |
170719s2017 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484227404
|9 978-1-4842-2740-4
|
024 |
7 |
|
|a 10.1007/978-1-4842-2740-4
|2 doi
|
040 |
|
|
|d GrThAP
|
100 |
1 |
|
|a Copeland, Marshall.
|e author.
|
245 |
1 |
0 |
|a Cyber Security on Azure
|h [electronic resource] :
|b An IT Professional’s Guide to Microsoft Azure Security Center /
|c by Marshall Copeland.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2017.
|
300 |
|
|
|a XVIII, 208 p. 137 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Part I: All Business Roles.- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business.- Chapter 2: Azure Security Center Cost Model.- Part II: Cloud Security Operations.- Chapter 3: Azure Security Center Getting Started.- Chapter 4: Azure Security Center Configuration.- Chapter 5: Azure Security Center Scenarios.- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks.
|
520 |
|
|
|a Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion d etection Identify potential vulnerabilities Prevent enterprise security failures.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Microsoft and .NET.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484227398
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4842-2740-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|