|
|
|
|
LEADER |
04316nam a2200481 4500 |
001 |
978-1-4842-4230-8 |
003 |
DE-He213 |
005 |
20191220221255.0 |
007 |
cr nn 008mamaa |
008 |
190124s2018 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484242308
|9 978-1-4842-4230-8
|
024 |
7 |
|
|a 10.1007/978-1-4842-4230-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.76.M52
|
072 |
|
7 |
|a UMP
|2 bicssc
|
072 |
|
7 |
|a COM051380
|2 bisacsh
|
072 |
|
7 |
|a UMP
|2 thema
|
082 |
0 |
4 |
|a 004.165
|2 23
|
100 |
1 |
|
|a Katzer, Matthew.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Securing Office 365
|h [electronic resource] :
|b Masterminding MDM and Compliance in the Cloud /
|c by Matthew Katzer.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2018.
|
300 |
|
|
|a XXII, 636 p. 549 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1. Why Security and Compliance -- 2. Azure and Office 365 Security -- 3. Office 365- Security Score -- 4. Office 365- Deploying Identity Management with EMS -- 5. Office 365- Mobile Device Management with EMS -- 6. Using Office 365 Compliance Center -- 7. Migration Step by Step -- 8. Managing Your Office 365.
|
520 |
|
|
|a Understand common security pitfalls and discover weak points in your organization's data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today's electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business. What You'll Learn: Manage security with the Azure Security Center and the Office 365 Compliance Center Configure information protection for document and electronic communications Monitor security for your business in the cloud Understand Mobile Application Management (MAM) and Mobile Device Management (MDM) Prevent data loss in Office 365 Configure and manage the compliance manager tools for NIST and GDPR This book is for IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business. Matthew Katzer created KAMIND in 1998 to supply solutions using Microsoft and Intel Technologies for small- and medium-sized businesses. Prior to creating KAMIND, Matt worked for Intel Corporation for 17 years managing engineering development, IT projects, and working with the Intel security group. After leaving Intel, Matt pursued the development of technology-related inventions and holds 19 domestic and international patents in related areas. Matt's focus with cloud solutions started in 2009, looking at ways for businesses to improve productivity and manage and secure digital business assets. Matt holds a BSEE degree from the University of Michigan and an Executive MBA from the University of Oregon.
|
650 |
|
0 |
|a Microsoft software.
|
650 |
|
0 |
|a Microsoft .NET Framework.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Knowledge management.
|
650 |
1 |
4 |
|a Microsoft and .NET.
|0 http://scigraph.springernature.com/things/product-market-codes/I29030
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Knowledge Management.
|0 http://scigraph.springernature.com/things/product-market-codes/515030
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484242292
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484242315
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-1-4842-4230-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-CWD
|
950 |
|
|
|a Professional and Applied Computing (Springer-12059)
|