This book presents comprehensive Azure Security Center etechniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Centre's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimise virtually all facets of modern security, from policies and identity to incident response and risk management. ...
Read More
This book presents comprehensive Azure Security Center etechniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Centre's full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You'll learn how to secure any Azure workload, and optimise virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you'll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft's leading cloud security experts show how to: Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management Master a new security paradigm for a world without traditional perimeters Gain visibility and control to secure compute, network, storage, and application workloads Incorporate Azure Security Centre into your security operations centre Integrate Azure Security Centre with Azure AD Identity Protection Centre and third-party solutions Adapt Azure Security Centre's built-in policies and definitions for your organisation Perform security assessments and implement Azure Security Centre recommendations Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Monitor user behaviour and access, and investigate compromised or misused credentials Customise and perform operating system security baseline assessments
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fair. This item is in overall acceptable condition. Covers and dust jackets are intact but may have heavy wear including creases, bends, edge wear, curled corners or minor tears as well as stickers or sticker-residue. Pages are intact but may have minor curls, bends or moderate to considerable highlighting/ writing. Binding is intact; however, spine may have heavy wear. A well-read copy overall. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you!
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!