Beginning Security with Microsoft Technologies Protecting Office 365, Devices, and Data /

Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security C...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Lakshmi, Vasantha (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03546nam a2200457 4500
001 978-1-4842-4853-9
003 DE-He213
005 20190829234550.0
007 cr nn 008mamaa
008 190829s2019 xxu| s |||| 0|eng d
020 |a 9781484248539  |9 978-1-4842-4853-9 
024 7 |a 10.1007/978-1-4842-4853-9  |2 doi 
040 |d GrThAP 
050 4 |a QA76.76.M52 
072 7 |a UMP  |2 bicssc 
072 7 |a COM051380  |2 bisacsh 
072 7 |a UMP  |2 thema 
082 0 4 |a 004.165  |2 23 
100 1 |a Lakshmi, Vasantha.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Beginning Security with Microsoft Technologies  |h [electronic resource] :  |b Protecting Office 365, Devices, and Data /  |c by Vasantha Lakshmi. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XV, 235 p. 209 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Current Security Outline -- Chapter 2: Securing Email and Office 365 -- Chapter 3: Device Level Security -- Chapter 4: Identity Protection -- Chapter 5: Data Protection. 
520 |a Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you'll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you'll see that there are a variety of ways in which you can protect your information. After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions. You will: Keep corporate data and user identities safe and secure Identify various levels and stages of attacks Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location Use advanced threat analytics, Azure Security Center, and Azure ATP. 
650 0 |a Microsoft software. 
650 0 |a Microsoft .NET Framework. 
650 0 |a Data protection. 
650 1 4 |a Microsoft and .NET.  |0 http://scigraph.springernature.com/things/product-market-codes/I29030 
650 2 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484248522 
776 0 8 |i Printed edition:  |z 9781484248546 
856 4 0 |u https://doi.org/10.1007/978-1-4842-4853-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)