Mastering Azure Security (notice n° 1556949)
[ vue normale ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03355cam a2200277zu 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | FRCYB88974551 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251020124321.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 251020s2025 fr | o|||||0|0|||eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9789365891317 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | FRCYB88974551 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | FR-PaCSA |
| Language of cataloging | en |
| Transcribing agency | |
| Description conventions | rda |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sharma, Arnav |
| 245 01 - TITLE STATEMENT | |
| Title | Mastering Azure Security |
| Remainder of title | Implementing Zero Trust, compliance, and threat protection with Azure security tools (English Edition) |
| Statement of responsibility, etc. | ['Sharma, Arnav'] |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
| Name of producer, publisher, distributor, manufacturer | BPB Publications |
| Date of production, publication, distribution, manufacture, or copyright notice | 2025 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | p. |
| 336 ## - CONTENT TYPE | |
| Content type code | txt |
| Source | rdacontent |
| 337 ## - MEDIA TYPE | |
| Media type code | c |
| Source | rdamdedia |
| 338 ## - CARRIER TYPE | |
| Carrier type code | c |
| Source | rdacarrier |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Description The adoption of the Cloud brings many security challenges. Securing identities, data, and workloads while trying to stay on the right side of compliance regulations has become a priority for organizations. Mastering Azure Security is your essential handbook for defending applications and data against a complex threat landscape. Starting with the fundamentals, this book guides you through Azure security from the ground up. You will begin with core concepts like the shared responsibility model and Zero Trust, then apply these to secure key service layers, such as identity and access with Entra ID, networks with NSGs and Azure Firewall, compute for VMs and containers, and data with encryption and access controls. Furthermore, you will look at security governance, learning to manage your environment at scale using Azure Policy and Azure Landing Zones. Finally, you will learn about posture management with Microsoft Defender for Cloud and detect threats using Microsoft Sentinel. By the end of this book, readers will gain an understanding of Azure security and develop the practical skills required to design, implement, and maintain a secure and compliant cloud infrastructure. Whether you are trying to nail down compliance, make systems more resilient, or know how to handle the latest threats, this book will give you the skills to make it happen. What you will learn ? Secure Azure compute and virtual networks with policies and controls. ? Implement data encryption, masking, and auditing in Azure. ? Protect workloads with Microsoft Defender for Cloud services. ? Apply Zero Trust principles to users and applications. ? Govern resources with Azure Policy, CAF, and WAF. ? Manage secrets and keys using Azure Key Vault. ? Strengthen security posture with monitoring and automation. Who this book is for This book is for cloud engineers, IT professionals, security architects, consultants, and risk managers who work with Microsoft Azure. It is equally useful for administrators, security teams, and learners aiming to master practical Azure security. Whether you focus on compliance, Zero Trust, or workload protection, this book offers hands-on strategies to build and maintain secure Azure environments. Table of Contents 1. Introduction to Azure Security 2. Securing Identity and Access 3. Securing Networks 4. Securing Compute 5. Securing Data 6. Security Governance 7. Security Posture 8. Workload Protection 9. Security Monitoring 10. Security Best Practices |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | |
| 700 0# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Sharma, Arnav |
| 856 40 - ELECTRONIC LOCATION AND ACCESS | |
| Access method | Cyberlibris |
| Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88974551">https://international.scholarvox.com/netsen/book/88974551</a> |
| Electronic format type | text/html |
| Host name | |
Pas d'exemplaire disponible.




Réseaux sociaux