Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing

This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Lad, Sagar (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY Apress [2023]
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-089794273
003 DE-627-1
005 20240228121855.0
007 cr uuu---uuuuu
008 230322s2023 xx |||||o 00| ||eng c
020 |a 9781484289365  |c electronic bk.  |9 978-1-4842-8936-5 
020 |a 1484289366  |c electronic bk.  |9 1-4842-8936-6 
035 |a (DE-627-1)089794273 
035 |a (DE-599)KEP089794273 
035 |a (ORHE)9781484289365 
035 |a (DE-627-1)089794273 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a UMP  |2 bicssc 
072 7 |a COM051380  |2 bisacsh 
082 0 |a 005.8  |2 23/eng/20221213 
100 1 |a Lad, Sagar  |e VerfasserIn  |4 aut 
245 1 0 |a Azure Security for critical workloads  |b implementing modern security controls for authentication, authorization and auditing  |c Sagar Lad 
250 |a [First edition]. 
264 1 |a New York, NY  |b Apress  |c [2023] 
300 |a 1 online resource (xiii, 218 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes index 
520 |a This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure. 
650 0 |a Microsoft Azure (Computing platform) 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
650 0 |a Cloud computing 
650 4 |a Microsoft Azure (Plateforme informatique) 
650 4 |a Sécurité informatique 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Infonuagique 
650 4 |a Cloud computing 
650 4 |a Computer networks ; Security measures 
650 4 |a Computer security 
650 4 |a Microsoft Azure (Computing platform) 
776 1 |z 9781484289358 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781484289358 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781484289365/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-089794273
_version_ 1818767247799222273
adam_text
any_adam_object
author Lad, Sagar
author_facet Lad, Sagar
author_role aut
author_sort Lad, Sagar
author_variant s l sl
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)089794273
(DE-599)KEP089794273
(ORHE)9781484289365
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03256cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-089794273</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121855.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230322s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484289365</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4842-8936-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484289366</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4842-8936-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089794273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484289365</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)089794273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UMP</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM051380</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lad, Sagar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Azure Security for critical workloads</subfield><subfield code="b">implementing modern security controls for authentication, authorization and auditing</subfield><subfield code="c">Sagar Lad</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 218 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Microsoft Azure (Computing platform)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Azure (Plateforme informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Azure (Computing platform)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781484289358</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781484289358</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484289365/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-089794273
illustrated Illustrated
indexdate 2024-12-18T08:46:51Z
institution BVB
isbn 9781484289365
1484289366
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (xiii, 218 pages) illustrations
psigel ZDB-30-ORH
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher Apress
record_format marc
spelling Lad, Sagar VerfasserIn aut
Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad
[First edition].
New York, NY Apress [2023]
1 online resource (xiii, 218 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes index
This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture. After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure.
Microsoft Azure (Computing platform)
Computer security
Computer networks Security measures
Cloud computing
Microsoft Azure (Plateforme informatique)
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Infonuagique
Computer networks ; Security measures
9781484289358
Erscheint auch als Druck-Ausgabe 9781484289358
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484289365/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Lad, Sagar
Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing
Microsoft Azure (Computing platform)
Computer security
Computer networks Security measures
Cloud computing
Microsoft Azure (Plateforme informatique)
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Infonuagique
Computer networks ; Security measures
title Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing
title_auth Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing
title_exact_search Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing
title_full Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad
title_fullStr Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad
title_full_unstemmed Azure Security for critical workloads implementing modern security controls for authentication, authorization and auditing Sagar Lad
title_short Azure Security for critical workloads
title_sort azure security for critical workloads implementing modern security controls for authentication authorization and auditing
title_sub implementing modern security controls for authentication, authorization and auditing
topic Microsoft Azure (Computing platform)
Computer security
Computer networks Security measures
Cloud computing
Microsoft Azure (Plateforme informatique)
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Infonuagique
Computer networks ; Security measures
topic_facet Microsoft Azure (Computing platform)
Computer security
Computer networks Security measures
Cloud computing
Microsoft Azure (Plateforme informatique)
Sécurité informatique
Réseaux d'ordinateurs ; Sécurité ; Mesures
Infonuagique
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781484289365/?ar
work_keys_str_mv AT ladsagar azuresecurityforcriticalworkloadsimplementingmodernsecuritycontrolsforauthenticationauthorizationandauditing