Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Beginning Security with Microsoft Te...
~
SpringerLink (Online service)
Beginning Security with Microsoft Technologies = Protecting Office 365, Devices, and Data /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Beginning Security with Microsoft Technologies/ by Vasantha Lakshmi.
Reminder of title:
Protecting Office 365, Devices, and Data /
Author:
Lakshmi, Vasantha.
Description:
XV, 235 p. 209 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Microsoft software. -
Online resource:
https://doi.org/10.1007/978-1-4842-4853-9
ISBN:
9781484248539
Beginning Security with Microsoft Technologies = Protecting Office 365, Devices, and Data /
Lakshmi, Vasantha.
Beginning Security with Microsoft Technologies
Protecting Office 365, Devices, and Data /[electronic resource] :by Vasantha Lakshmi. - 1st ed. 2019. - XV, 235 p. 209 illus.online resource.
Chapter 1: Current Security Outline -- Chapter 2: Securing Email and Office 365 -- Chapter 3: Device Level Security -- Chapter 4: Identity Protection -- Chapter 5: Data Protection.
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you’ll see that there are a variety of ways in which you can protect your information. After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions. You will: Keep corporate data and user identities safe and secure Identify various levels and stages of attacks Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location Use advanced threat analytics, Azure Security Center, and Azure ATP.
ISBN: 9781484248539
Standard No.: 10.1007/978-1-4842-4853-9doiSubjects--Topical Terms:
1253736
Microsoft software.
LC Class. No.: QA76.76.M52
Dewey Class. No.: 004.165
Beginning Security with Microsoft Technologies = Protecting Office 365, Devices, and Data /
LDR
:03171nam a22003855i 4500
001
1005420
003
DE-He213
005
20200630234813.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484248539
$9
978-1-4842-4853-9
024
7
$a
10.1007/978-1-4842-4853-9
$2
doi
035
$a
978-1-4842-4853-9
050
4
$a
QA76.76.M52
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
004.165
$2
23
100
1
$a
Lakshmi, Vasantha.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1298871
245
1 0
$a
Beginning Security with Microsoft Technologies
$h
[electronic resource] :
$b
Protecting Office 365, Devices, and Data /
$c
by Vasantha Lakshmi.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XV, 235 p. 209 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Current Security Outline -- Chapter 2: Securing Email and Office 365 -- Chapter 3: Device Level Security -- Chapter 4: Identity Protection -- Chapter 5: Data Protection.
520
$a
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you’ll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you’ll see that there are a variety of ways in which you can protect your information. After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions. You will: Keep corporate data and user identities safe and secure Identify various levels and stages of attacks Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location Use advanced threat analytics, Azure Security Center, and Azure ATP.
650
0
$a
Microsoft software.
$3
1253736
650
0
$a
Microsoft .NET Framework.
$3
565417
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Microsoft and .NET.
$3
1114109
650
2 4
$a
Security.
$3
1114130
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484248522
776
0 8
$i
Printed edition:
$z
9781484248546
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4853-9
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login