Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing
This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authen...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Apress
[2023]
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-089794273 | ||
003 | DE-627-1 | ||
005 | 20240228121855.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230322s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781484289365 |c electronic bk. |9 978-1-4842-8936-5 | ||
020 | |a 1484289366 |c electronic bk. |9 1-4842-8936-6 | ||
035 | |a (DE-627-1)089794273 | ||
035 | |a (DE-599)KEP089794273 | ||
035 | |a (ORHE)9781484289365 | ||
035 | |a (DE-627-1)089794273 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UMP |2 bicssc | |
072 | 7 | |a COM051380 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23/eng/20221213 | |
100 | 1 | |a Lad, Sagar |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Azure Security for critical workloads |b implementing modern security controls for authentication, authorization and auditing |c Sagar Lad |
250 | |a [First edition]. | ||
264 | 1 | |a New York, NY |b Apress |c [2023] | |
300 | |a 1 online resource (xiii, 218 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure. | ||
650 | 0 | |a Microsoft Azure (Computing platform) | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Cloud computing | |
650 | 4 | |a Microsoft Azure (Plateforme informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Infonuagique | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Microsoft Azure (Computing platform) | |
776 | 1 | |z 9781484289358 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781484289358 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484289365/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-089794273 |
---|---|
_version_ | 1818767247799222273 |
adam_text | |
any_adam_object | |
author | Lad, Sagar |
author_facet | Lad, Sagar |
author_role | aut |
author_sort | Lad, Sagar |
author_variant | s l sl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)089794273 (DE-599)KEP089794273 (ORHE)9781484289365 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03256cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-089794273</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121855.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230322s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484289365</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-8936-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484289366</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-8936-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089794273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484289365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UMP</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051380</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lad, Sagar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Azure Security for critical workloads</subfield><subfield code="b">implementing modern security controls for authentication, authorization and auditing</subfield><subfield code="c">Sagar Lad</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 218 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Microsoft Azure (Computing platform)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Azure (Plateforme informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Azure (Computing platform)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484289358</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484289358</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484289365/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-089794273 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:46:51Z |
institution | BVB |
isbn | 9781484289365 1484289366 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xiii, 218 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Apress |
record_format | marc |
spelling | Lad, Sagar VerfasserIn aut Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad [First edition]. New York, NY Apress [2023] 1 online resource (xiii, 218 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure. Microsoft Azure (Computing platform) Computer security Computer networks Security measures Cloud computing Microsoft Azure (Plateforme informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique Computer networks ; Security measures 9781484289358 Erscheint auch als Druck-Ausgabe 9781484289358 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484289365/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Lad, Sagar Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Microsoft Azure (Computing platform) Computer security Computer networks Security measures Cloud computing Microsoft Azure (Plateforme informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique Computer networks ; Security measures |
title | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing |
title_auth | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing |
title_exact_search | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing |
title_full | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad |
title_fullStr | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad |
title_full_unstemmed | Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad |
title_short | Azure Security for critical workloads |
title_sort | azure security for critical workloads implementing modern security controls for authentication authorization and auditing |
title_sub | implementing modern security controls for authentication, authorization and auditing |
topic | Microsoft Azure (Computing platform) Computer security Computer networks Security measures Cloud computing Microsoft Azure (Plateforme informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique Computer networks ; Security measures |
topic_facet | Microsoft Azure (Computing platform) Computer security Computer networks Security measures Cloud computing Microsoft Azure (Plateforme informatique) Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Infonuagique Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781484289365/?ar |
work_keys_str_mv | AT ladsagar azuresecurityforcriticalworkloadsimplementingmodernsecuritycontrolsforauthenticationauthorizationandauditing |