• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Design and Deploy a Secure Azure Environment » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Design and Deploy a Secure Azure Environment

ISBN-13: 9781484296776 / Angielski / Miękka / 2023

Puthiyavan Udayakumar
Design and Deploy a Secure Azure Environment Puthiyavan Udayakumar 9781484296776 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Design and Deploy a Secure Azure Environment

ISBN-13: 9781484296776 / Angielski / Miękka / 2023

Puthiyavan Udayakumar
cena 231,17
(netto: 220,16 VAT:  5%)

Najniższa cena z 30 dni: 228,02
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF.

The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.
After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF.
What You Will Learn
  • Design and deploy security for infrastructure, data, and applications
  • Design and deploy an identify solution
  • Design and deploy a protect solution
  • Design and deploy a detect solution
  • Design and deploy a respond solution
  • Design and deploy a recover solution
Who This Book Is For

Cyber system administrators and architects working with Microsoft Azure integrated services

Beginning-Intermediate user level

Kategorie:
Informatyka, Programowanie
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484296776
Rok wydania:
2023
Waga:
1.35 kg
Wymiary:
25.4 x 17.8
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1: Getting Started with Azure Security  

o    Introduction to Cloud Security

o    Best practices for securing enterprise cloud

o    Create an overall security design baseline

o    Define Security Operations Strategy

o    Overview of NIST Cybersecurity framework

Chapter 2: Design and deploy security for infrastructure, data and apps

o    Design and deploy a strategy for securing server and client endpoints \

o    Design and deploy a strategy for securing SaaS, PaaS, and IaaS services

o    Design and deploy security for data across Azure enterprise environment

o    Design and deploy security for application across Azure enterprise environment

Chapter 3: Design and deploy Identify solution.

o    Introduction to Azure identify security services

o    Design and deploy Azure information protection

o    Design and deploy Azure network watcher

o    Design and deploy Azure Policy

Chapter 4: Design and deploy Identify solution.

o    Design and deploy Azure Automation

o    Design and deploy Azure IoT Hub

o    Design and deploy Microsoft Intune

o    Design and deploy Service Map

o    Enable Security Center

Chapter 5: Design and deploy detect solution.

o    Design and deploy Azure Intelligent Security Graph

o    Design and deploy Azure monitor

o    Design and deploy Azure Sentinel

Chapter 6: Design and deploy protect solution

o    Design and deploy Azure Application gateway

o    Design and deploy Azure Firewall

o    Design and deploy Azure WAF

Chapter 7: Design and deploy protect solution.

o    Design and deploy Azure AD and AD Identity protection

o    Design and deploy Azure DDoS

o    Design and deploy Azure NSG

Chapter 8: Design and deploy protect solution.

o    Design and deploy Azure NSG

o    Design and deploy Azure Bastion

o    Design and deploy Azure Encryption

Chapter 9: Design and deploy respond solution

o    Design and deploy Azure Logic Apps

o    Design and deploy Azure Encryption

o    Define your security team

Chapter 10: Design and deploy recover solution

o    Design and deploy Azure Backup

o    Design and deploy Site recovery

Puthiyavan Udayakumar is an infrastructure architect with over 15 years of experience in modernizing and securing IT infrastructure, including the cloud. He has been writing technical books for more than 10 years on various infrastructure and cybersecurity domains. He has designed, deployed, and secured IT infrastructure on premises and in the cloud, including virtual servers, networks, storage, and desktops for various industries (including pharmaceutical, banking, healthcare, aviation, federal entities, etc.). He is an open group certified Master certified architect.


Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF.


The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.

After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF.

What You Will Learn

  • Design and deploy security for infrastructure, data, and applications
  • Design and deploy an identify solution
  • Design and deploy a protect solution
  • Design and deploy a detect solution
  • Design and deploy a respond solution
  • Design and deploy a recover solution



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia