Coverart for item
The Resource Cyber security on Azure : an IT professionals guide to Microsoft Azure security center, Marshall Copeland, (electronic book)

Cyber security on Azure : an IT professionals guide to Microsoft Azure security center, Marshall Copeland, (electronic book)

Label
Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
Title
Cyber security on Azure
Title remainder
an IT professionals guide to Microsoft Azure security center
Statement of responsibility
Marshall Copeland
Creator
Subject
Language
eng
Summary
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion detection Identify potential vulnerabilities Prevent enterprise security failures
Cataloging source
YDX
http://library.link/vocab/creatorName
Copeland, Marshall
Dewey number
  • 005.8
  • 004
Index
no index present
LC call number
  • QA76.9.A25
  • QA75.5-76.95
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
Label
Cyber security on Azure : an IT professionals guide to Microsoft Azure security center, Marshall Copeland, (electronic book)
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: All Businesses; Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business; Executive Summary; Understanding Attackers' Motivation; Remain Current Through Security Facts; Microsoft Security Intelligence Report; Why It Is Important; Where to Download; Verizon 2017 Data Breach Investigations Report; Verizon 2016 Data Breach Investigations Report; Why It Is Important; Where to Download; IBM-Sponsored Ponemon Cost of Data Breach Study; Why It Is Important
  • Where to DownloadOther Annual Security Reports; Cisco Annual Security Report; Where to Download; FireEye M-Trends 2017 Annual Security Report; Where to Download; Georgia Tech Emerging Cyber Threats Report; Where to Download; Steps for a Secure Cloud; Azure Cloud Networking, Encryption, Data Storage; Identity Multifactor Authentication; Software Is a Key Vulnerability; OWASP Top Ten Project; Finding Cloud Blind Spots to Improve Your Network Security Knowledge; NVD Use with ITIL/Change Management Patching; Security Responsibility Model; Why It Is Important; Summary
  • Chapter 2: Azure Security Center Cost ModelShared Cost Model; License Cost of Security Center; Azure Cost of Data Storage; Quantitative Risk Assessments and Cost-Benefit Analysis; Other Considerations (Security Sensitive); Azure Active Directory; Azure Support Plans; Application Gateway; Enterprise Security Architecture; Ransomware Lessons Learned; Summary; Part II: Cloud Security Operations; Chapter 3: Getting Started with Azure Security Center; Cloud Security Challenges; Security Center Overview; Security Center Placement; Preventing an Azure Infrastructure Breach
  • Establishing or Improving a Cybersecurity Program Azure Virtual Networking Example; Select an Azure Subscription; Navigating Microsoft Azure; Summary; Chapter 4: Azure Security Center Configuration; Azure Infrastructure Design; Azure Security Center Pricing Tier; Standard Tier Advantages; Advanced Threat Detection; Anomaly Detection; Crash Analysis; Threat Intelligence; Behavioral Analysis; Using Security Center; Summary; Chapter 5: Azure Security Center Scenarios; Security Health Monitoring; Security Recommendations Procedures; Prevention Blade; Network Security Groups; Summary
  • Chapter 6: Azure Security Center ExtensionsSecurity Center Updates; Detection and Security Alerts; Recommendations; Next-Generation Firewalls; Vulnerability Assessment Integration; Summary; Appendix A: Troubleshooting and Cyber-Reference; Azure Security Center Diagnostics Troubleshooting; Cyber-Reference; What's in a Name; Glossary; Definitions; Security, Identity, and Cryptography; Attack Method; Appendix B: Know Your Enemy; Professional Education; Security Risk Landscape; Understanding Cybersecurity Attack Details; Now to the Why and How Cyber-Attacks Are Achieved
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9781484227404
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
ocn994787567
Label
Cyber security on Azure : an IT professionals guide to Microsoft Azure security center, Marshall Copeland, (electronic book)
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: All Businesses; Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business; Executive Summary; Understanding Attackers' Motivation; Remain Current Through Security Facts; Microsoft Security Intelligence Report; Why It Is Important; Where to Download; Verizon 2017 Data Breach Investigations Report; Verizon 2016 Data Breach Investigations Report; Why It Is Important; Where to Download; IBM-Sponsored Ponemon Cost of Data Breach Study; Why It Is Important
  • Where to DownloadOther Annual Security Reports; Cisco Annual Security Report; Where to Download; FireEye M-Trends 2017 Annual Security Report; Where to Download; Georgia Tech Emerging Cyber Threats Report; Where to Download; Steps for a Secure Cloud; Azure Cloud Networking, Encryption, Data Storage; Identity Multifactor Authentication; Software Is a Key Vulnerability; OWASP Top Ten Project; Finding Cloud Blind Spots to Improve Your Network Security Knowledge; NVD Use with ITIL/Change Management Patching; Security Responsibility Model; Why It Is Important; Summary
  • Chapter 2: Azure Security Center Cost ModelShared Cost Model; License Cost of Security Center; Azure Cost of Data Storage; Quantitative Risk Assessments and Cost-Benefit Analysis; Other Considerations (Security Sensitive); Azure Active Directory; Azure Support Plans; Application Gateway; Enterprise Security Architecture; Ransomware Lessons Learned; Summary; Part II: Cloud Security Operations; Chapter 3: Getting Started with Azure Security Center; Cloud Security Challenges; Security Center Overview; Security Center Placement; Preventing an Azure Infrastructure Breach
  • Establishing or Improving a Cybersecurity Program Azure Virtual Networking Example; Select an Azure Subscription; Navigating Microsoft Azure; Summary; Chapter 4: Azure Security Center Configuration; Azure Infrastructure Design; Azure Security Center Pricing Tier; Standard Tier Advantages; Advanced Threat Detection; Anomaly Detection; Crash Analysis; Threat Intelligence; Behavioral Analysis; Using Security Center; Summary; Chapter 5: Azure Security Center Scenarios; Security Health Monitoring; Security Recommendations Procedures; Prevention Blade; Network Security Groups; Summary
  • Chapter 6: Azure Security Center ExtensionsSecurity Center Updates; Detection and Security Alerts; Recommendations; Next-Generation Firewalls; Vulnerability Assessment Integration; Summary; Appendix A: Troubleshooting and Cyber-Reference; Azure Security Center Diagnostics Troubleshooting; Cyber-Reference; What's in a Name; Glossary; Definitions; Security, Identity, and Cryptography; Attack Method; Appendix B: Know Your Enemy; Professional Education; Security Risk Landscape; Understanding Cybersecurity Attack Details; Now to the Why and How Cyber-Attacks Are Achieved
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9781484227404
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
ocn994787567

Library Locations

Processing Feedback ...