001443048 000__ 04510cam\a2200529Ia\4500 001443048 001__ 1443048 001443048 003__ OCoLC 001443048 005__ 20230310003524.0 001443048 006__ m\\\\\o\\d\\\\\\\\ 001443048 007__ cr\un\nnnunnun 001443048 008__ 211206s2022\\\\xxu\\\\\o\\\\\000\0\eng\d 001443048 019__ $$a1287677933$$a1287892551$$a1287924712$$a1290489336$$a1290596781$$a1290680002 001443048 020__ $$a9781484278604$$q(electronic bk.) 001443048 020__ $$a1484278607$$q(electronic bk.) 001443048 020__ $$z1484278593 001443048 020__ $$z9781484278598 001443048 0247_ $$a10.1007/978-1-4842-7860-4$$2doi 001443048 0248_ $$a9781484278598 001443048 0248_ $$a9781484278604 001443048 035__ $$aSP(OCoLC)1287616536 001443048 040__ $$aYDX$$beng$$cYDX$$dTOH$$dVT2$$dSTF$$dEBLCP$$dORMDA$$dN$T$$dOCLCO$$dCNO$$dOCLCF$$dGW5XE$$dOCLCO$$dOCLCQ 001443048 049__ $$aISEA 001443048 050_4 $$aQA76.585 001443048 08204 $$a005.8 001443048 1001_ $$aHerath, Pushpa,$$eauthor. 001443048 24510 $$aAzure cloud security for absolute beginners :$$benabling cloud infrastructure security with multi-level security options /$$cPushpa Herath. 001443048 260__ $$a[United States] :$$bApress,$$c2022. 001443048 300__ $$a1 online resource (1 volume) :$$billustrations (colour) 001443048 336__ $$atext$$btxt$$2rdacontent 001443048 337__ $$acomputer$$bc$$2rdamedia 001443048 338__ $$aonline resource$$bcr$$2rdacarrier 001443048 347__ $$atext file 001443048 5050_ $$aChapter 1: Understanding the Importance of Data/Application Security -- Chapter 2: Overview of Basic Azure Security Components -- Chapter 3: Introduction to Azure Active Directory -- Chapter 4: Working with Azure Key Vault -- Chapter 5: Ensure Azure Application Security -- Chapter 6: Ensure Data Security with Azure Storages -- Chapter 7: Ensure Security using Azure Virtual Networks -- Chapter 8: Azure Virtual Machine Security -- Chapter 9: Securing resources with Azure Firewall -- Chapter 10: App Service Environments. 001443048 506__ $$aAccess limited to authorized users. 001443048 520__ $$aImplement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure. Author Pushpa Herath begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you'll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you. After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure. What Will You Learn Get up and running quickly securing Azure Master the basic language of Azure security Understand the security features available in Azure cloud Configure and maintain Azure cloud security features Secure Azure PaaS Services Learn identity and access management options in Azure Cloud Who Is This Book For Cloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security. 001443048 542__ $$f© Copyright 2022 Pushpa Herath.$$g2022 001443048 650_0 $$aCloud computing$$xSecurity measures. 001443048 650_0 $$aMicrosoft Azure (Computing platform) 001443048 650_6 $$aInfonuagique$$xSécurité$$xMesures. 001443048 655_0 $$aElectronic books. 001443048 77608 $$iPrint version:$$z1484278593$$z9781484278598$$w(OCoLC)1273336217 001443048 852__ $$bebk 001443048 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-7860-4$$zOnline Access$$91397441.1 001443048 909CO $$ooai:library.usi.edu:1443048$$pGLOBAL_SET 001443048 980__ $$aBIB 001443048 980__ $$aEBOOK 001443048 982__ $$aEbook 001443048 983__ $$aOnline 001443048 994__ $$a92$$bISE