Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1959
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Copeland, Marshall. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:45Z | - |
dc.date.available | 2020-05-17T08:34:45Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227404 ; | en_US |
dc.identifier.isbn | 9781484227398 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227398. ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227404.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Microsoft and .NET. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.title | Cyber Security on Azure | en_US |
dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Copeland, Marshall. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:45Z | - |
dc.date.available | 2020-05-17T08:34:45Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227404 ; | en_US |
dc.identifier.isbn | 9781484227398 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227398. ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227404.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Microsoft and .NET. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.title | Cyber Security on Azure | en_US |
dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Copeland, Marshall. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:34:45Z | - |
dc.date.available | 2020-05-17T08:34:45Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227404 ; | en_US |
dc.identifier.isbn | 9781484227398 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1959 | - |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227398. ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ; | en_US |
dc.description.statementofresponsibility | by Marshall Copeland. | en_US |
dc.description.tableofcontents | Part I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ; | en_US |
dc.format.extent | XVIII, 208 p. 137 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227404.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Microsoft and .NET. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.title | Cyber Security on Azure | en_US |
dc.title.alternative | An IT Professionalees Guide to Microsoft Azure Security Center / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227404.pdf | 12.35 MB | Adobe PDF | ![]() Preview File |