語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Azure Security Handbook = A Comprehe...
~
SpringerLink (Online service)
Azure Security Handbook = A Comprehensive Guide for Defending Your Enterprise Environment /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Azure Security Handbook/ by Karl Ots.
其他題名:
A Comprehensive Guide for Defending Your Enterprise Environment /
作者:
Ots, Karl.
面頁冊數:
XXI, 148 p. 42 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Principles and Models of Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-7292-3
ISBN:
9781484272923
Azure Security Handbook = A Comprehensive Guide for Defending Your Enterprise Environment /
Ots, Karl.
Azure Security Handbook
A Comprehensive Guide for Defending Your Enterprise Environment /[electronic resource] :by Karl Ots. - 1st ed. 2021. - XXI, 148 p. 42 illus.online resource.
Chapter 1. Introduction to Cloud Security Architecture -- Chapter 2. Identity and Access Management -- Chapter 3. Logging and Monitoring -- Chapter 4. Network Security -- Chapter 5. Workload Protection- Data -- Chapter 6. Workload Protection- Platform-as-a-Service -- Chapter 7. Workload Protection- Containers -- Chapter 8. Workload Protection- IaaS.
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization. This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigue and confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure. What You Will Learn Remediate security risks of Azure applications by implementing the right security controls at the right time Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations Protect the most common reference workloads according to security best practices Design secure access control solutions for your Azure administrative access, as well as Azure application access This book is designed for cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise. Karl Ots is a cloud and cybersecurity leader with more than a decade of experience in Microsoft Azure security. He has worked with large enterprises in fields such as technology, manufacturing, and finance. Karl is recognized as a Microsoft Regional Director, a patented inventor, a LinkedIn Learning instructor, and a Microsoft Azure MVP. He holds the Azure Security Engineer, SABSA Foundation SCF, and CISSP certifications. Karl is a frequent speaker on cloud security topics at global conferences such as Microsoft Ignite or (ISC)2 Security Congress. He hosts the Cloud Gossip podcast.
ISBN: 9781484272923
Standard No.: 10.1007/978-1-4842-7292-3doiSubjects--Topical Terms:
1225876
Principles and Models of Security.
LC Class. No.: QA76.76.M52
Dewey Class. No.: 004.165
Azure Security Handbook = A Comprehensive Guide for Defending Your Enterprise Environment /
LDR
:04360nam a22003855i 4500
001
1047379
003
DE-He213
005
20210828145554.0
007
cr nn 008mamaa
008
220103s2021 xxu| s |||| 0|eng d
020
$a
9781484272923
$9
978-1-4842-7292-3
024
7
$a
10.1007/978-1-4842-7292-3
$2
doi
035
$a
978-1-4842-7292-3
050
4
$a
QA76.76.M52
072
7
$a
UMP
$2
bicssc
072
7
$a
COM051380
$2
bisacsh
072
7
$a
UMP
$2
thema
082
0 4
$a
004.165
$2
23
100
1
$a
Ots, Karl.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1351084
245
1 0
$a
Azure Security Handbook
$h
[electronic resource] :
$b
A Comprehensive Guide for Defending Your Enterprise Environment /
$c
by Karl Ots.
250
$a
1st ed. 2021.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
XXI, 148 p. 42 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Introduction to Cloud Security Architecture -- Chapter 2. Identity and Access Management -- Chapter 3. Logging and Monitoring -- Chapter 4. Network Security -- Chapter 5. Workload Protection- Data -- Chapter 6. Workload Protection- Platform-as-a-Service -- Chapter 7. Workload Protection- Containers -- Chapter 8. Workload Protection- IaaS.
520
$a
Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization. This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigue and confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure. What You Will Learn Remediate security risks of Azure applications by implementing the right security controls at the right time Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations Protect the most common reference workloads according to security best practices Design secure access control solutions for your Azure administrative access, as well as Azure application access This book is designed for cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise. Karl Ots is a cloud and cybersecurity leader with more than a decade of experience in Microsoft Azure security. He has worked with large enterprises in fields such as technology, manufacturing, and finance. Karl is recognized as a Microsoft Regional Director, a patented inventor, a LinkedIn Learning instructor, and a Microsoft Azure MVP. He holds the Azure Security Engineer, SABSA Foundation SCF, and CISSP certifications. Karl is a frequent speaker on cloud security topics at global conferences such as Microsoft Ignite or (ISC)2 Security Congress. He hosts the Cloud Gossip podcast.
650
2 4
$a
Principles and Models of Security.
$3
1225876
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
1 4
$a
Microsoft and .NET.
$3
1114109
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Microsoft .NET Framework.
$3
565417
650
0
$a
Microsoft software.
$3
1253736
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484272916
776
0 8
$i
Printed edition:
$z
9781484272930
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7292-3
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入