Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1959
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCopeland, Marshall. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:34:45Z-
dc.date.available2020-05-17T08:34:45Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227404 ;en_US
dc.identifier.isbn9781484227398 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1959-
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227398. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractPrevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ;en_US
dc.description.statementofresponsibilityby Marshall Copeland.en_US
dc.description.tableofcontentsPart I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ;en_US
dc.format.extentXVIII, 208 p. 137 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227404.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectMicrosoft and .NET. ;en_US
dc.subjectSystems and Data Securityen_US
dc.titleCyber Security on Azureen_US
dc.title.alternativeAn IT Professionalees Guide to Microsoft Azure Security Center /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227404.pdf12.35 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCopeland, Marshall. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:34:45Z-
dc.date.available2020-05-17T08:34:45Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227404 ;en_US
dc.identifier.isbn9781484227398 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1959-
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227398. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractPrevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ;en_US
dc.description.statementofresponsibilityby Marshall Copeland.en_US
dc.description.tableofcontentsPart I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ;en_US
dc.format.extentXVIII, 208 p. 137 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227404.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectMicrosoft and .NET. ;en_US
dc.subjectSystems and Data Securityen_US
dc.titleCyber Security on Azureen_US
dc.title.alternativeAn IT Professionalees Guide to Microsoft Azure Security Center /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227404.pdf12.35 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCopeland, Marshall. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:34:45Z-
dc.date.available2020-05-17T08:34:45Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227404 ;en_US
dc.identifier.isbn9781484227398 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1959-
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227398. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractPrevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures. ;en_US
dc.description.statementofresponsibilityby Marshall Copeland.en_US
dc.description.tableofcontentsPart I: All Business Roles -- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business -- Chapter 2: Azure Security Center Cost Model -- Part II: Cloud Security Operations -- Chapter 3: Azure Security Center Getting Started -- Chapter 4: Azure Security Center Configuration -- Chapter 5: Azure Security Center Scenarios -- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. ;en_US
dc.format.extentXVIII, 208 p. 137 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227404.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectComputer Scienceen_US
dc.subjectMicrosoft and .NET. ;en_US
dc.subjectSystems and Data Securityen_US
dc.titleCyber Security on Azureen_US
dc.title.alternativeAn IT Professionalees Guide to Microsoft Azure Security Center /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227404.pdf12.35 MBAdobe PDFThumbnail
Preview File