جهت دسترسی به کاربرگه ی زیر، از این لینک استفاده کنید.
http://localhost/handle/Hannan/1959
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Copeland, Marshall. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:34:45Z | - |
| dc.date.available | 2020-05-17T08:34:45Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9781484227404 ; | en_US |
| dc.identifier.isbn | 9781484227398 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
| dc.description | QA76 | en_US |
| dc.description | en_US | |
| dc.description | Printed edition: ; 9781484227398. ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
| dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
| dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
| dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
| dc.publisher | Apress : | en_US |
| dc.publisher | Imprint: Apress, | en_US |
| dc.relation.haspart | 9781484227404.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Microsoft and .NET. ; | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.title | Cyber Security on Azure | en_US |
| dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Berkeley, CA : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Copeland, Marshall. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:34:45Z | - |
| dc.date.available | 2020-05-17T08:34:45Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9781484227404 ; | en_US |
| dc.identifier.isbn | 9781484227398 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
| dc.description | QA76 | en_US |
| dc.description | en_US | |
| dc.description | Printed edition: ; 9781484227398. ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
| dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
| dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
| dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
| dc.publisher | Apress : | en_US |
| dc.publisher | Imprint: Apress, | en_US |
| dc.relation.haspart | 9781484227404.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Microsoft and .NET. ; | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.title | Cyber Security on Azure | en_US |
| dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Berkeley, CA : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Copeland, Marshall. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:34:45Z | - |
| dc.date.available | 2020-05-17T08:34:45Z | - |
| dc.date.issued | 2017 | en_US |
| dc.identifier.isbn | 9781484227404 ; | en_US |
| dc.identifier.isbn | 9781484227398 (print) ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
| dc.description | QA76 | en_US |
| dc.description | en_US | |
| dc.description | Printed edition: ; 9781484227398. ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description | en_US | |
| dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
| dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
| dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
| dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
| dc.publisher | Apress : | en_US |
| dc.publisher | Imprint: Apress, | en_US |
| dc.relation.haspart | 9781484227404.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Microsoft and .NET. ; | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.title | Cyber Security on Azure | en_US |
| dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Berkeley, CA : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() مشاهده فایل |
