Azure security cookbook: practical recipes for securing Azure resources and operations
With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing
2023
|
Ausgabe: | 1st edition |
Schlagworte: | |
Online-Zugang: | FHA01 FLA01 UBY01 |
Zusammenfassung: | With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources. |
Beschreibung: | 1st edition - Cover Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xvii, 353 Seiten) Illustrationen, Diagramme |
ISBN: | 9781804616673 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV049365500 | ||
003 | DE-604 | ||
005 | 20240123 | ||
007 | cr|uuu---uuuuu | ||
008 | 231016s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781804616673 |c EBook (PDF) |9 978-1-80461-667-3 | ||
035 | |a (OCoLC)1409120083 | ||
035 | |a (DE-599)KEP096542152 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-Aug4 |a DE-706 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 201 |0 (DE-625)143612: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Miles, Steve |e Verfasser |0 (DE-588)1306201837 |4 aut | |
245 | 1 | 0 | |a Azure security cookbook |b practical recipes for securing Azure resources and operations |c Steve Miles |
250 | |a 1st edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing |c 2023 | |
300 | |a 1 Online-Ressource (xvii, 353 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a 1st edition - Cover | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources. | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows Azure |0 (DE-588)7693533-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
653 | 0 | |a Microsoft Azure (Computing platform) | |
653 | 0 | |a Computer security | |
653 | 0 | |a Cybersecurity | |
653 | 0 | |a Cloud & Security | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a COMPUTERS / Internet / Online Safety & Privacy | |
653 | 0 | |a COMPUTERS / Distributed Systems / Cloud Computing | |
689 | 0 | 0 | |a Windows Azure |0 (DE-588)7693533-4 |D s |
689 | 0 | 1 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80461-796-0 |
912 | |a ZDB-221-PCL |a ZDB-221-PCR |a ZDB-30-ORH |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034625583 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006718.html |l FHA01 |p ZDB-221-PCR |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006718.html |l FLA01 |p ZDB-221-PCL |q FLA_PCL_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006718.html |l UBY01 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185908585431040 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Miles, Steve |
author_GND | (DE-588)1306201837 |
author_facet | Miles, Steve |
author_role | aut |
author_sort | Miles, Steve |
author_variant | s m sm |
building | Verbundindex |
bvnumber | BV049365500 |
classification_rvk | ST 200 ST 201 ST 276 |
collection | ZDB-221-PCL ZDB-221-PCR ZDB-30-ORH ZDB-30-PQE |
ctrlnum | (OCoLC)1409120083 (DE-599)KEP096542152 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1st edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03419nmm a22005771c 4500</leader><controlfield tag="001">BV049365500</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240123 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231016s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804616673</subfield><subfield code="c">EBook (PDF)</subfield><subfield code="9">978-1-80461-667-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1409120083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP096542152</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 201</subfield><subfield code="0">(DE-625)143612:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miles, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1306201837</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Azure security cookbook</subfield><subfield code="b">practical recipes for securing Azure resources and operations</subfield><subfield code="c">Steve Miles</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 353 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1st edition - Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Azure</subfield><subfield code="0">(DE-588)7693533-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Microsoft Azure (Computing platform)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cloud & Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Distributed Systems / Cloud Computing</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Windows Azure</subfield><subfield code="0">(DE-588)7693533-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80461-796-0</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield><subfield code="a">ZDB-221-PCR</subfield><subfield code="a">ZDB-30-ORH</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034625583</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006718.html</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-221-PCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006718.html</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">FLA_PCL_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006718.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049365500 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:53:08Z |
indexdate | 2024-07-10T10:02:42Z |
institution | BVB |
isbn | 9781804616673 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034625583 |
oclc_num | 1409120083 |
open_access_boolean | |
owner | DE-860 DE-Aug4 DE-706 |
owner_facet | DE-860 DE-Aug4 DE-706 |
physical | 1 Online-Ressource (xvii, 353 Seiten) Illustrationen, Diagramme |
psigel | ZDB-221-PCL ZDB-221-PCR ZDB-30-ORH ZDB-30-PQE ZDB-221-PCL FLA_PCL_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Miles, Steve Verfasser (DE-588)1306201837 aut Azure security cookbook practical recipes for securing Azure resources and operations Steve Miles 1st edition Birmingham ; Mumbai Packt Publishing 2023 1 Online-Ressource (xvii, 353 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier 1st edition - Cover Includes bibliographical references and index With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems. This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity. By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources. Computersicherheit (DE-588)4274324-2 gnd rswk-swf Windows Azure (DE-588)7693533-4 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Microsoft Azure (Computing platform) Computer security Cybersecurity Cloud & Security COMPUTERS / Security / General COMPUTERS / Internet / Online Safety & Privacy COMPUTERS / Distributed Systems / Cloud Computing Windows Azure (DE-588)7693533-4 s Cloud Computing (DE-588)7623494-0 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-80461-796-0 |
spellingShingle | Miles, Steve Azure security cookbook practical recipes for securing Azure resources and operations Computersicherheit (DE-588)4274324-2 gnd Windows Azure (DE-588)7693533-4 gnd Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7693533-4 (DE-588)7623494-0 |
title | Azure security cookbook practical recipes for securing Azure resources and operations |
title_auth | Azure security cookbook practical recipes for securing Azure resources and operations |
title_exact_search | Azure security cookbook practical recipes for securing Azure resources and operations |
title_exact_search_txtP | Azure security cookbook practical recipes for securing Azure resources and operations |
title_full | Azure security cookbook practical recipes for securing Azure resources and operations Steve Miles |
title_fullStr | Azure security cookbook practical recipes for securing Azure resources and operations Steve Miles |
title_full_unstemmed | Azure security cookbook practical recipes for securing Azure resources and operations Steve Miles |
title_short | Azure security cookbook |
title_sort | azure security cookbook practical recipes for securing azure resources and operations |
title_sub | practical recipes for securing Azure resources and operations |
topic | Computersicherheit (DE-588)4274324-2 gnd Windows Azure (DE-588)7693533-4 gnd Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Computersicherheit Windows Azure Cloud Computing |
work_keys_str_mv | AT milessteve azuresecuritycookbookpracticalrecipesforsecuringazureresourcesandoperations |