Buy Microsoft Azure Security Infrastructure - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Operating systems > Microsoft (Windows) operating systems > Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)
Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)

Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You’ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement–so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve.   Three Microsoft Azure experts show you how to: • Understand cloud security boundaries and responsibilities • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection • Explore Azure’s defense-in-depth security architecture • Use Azure network security patterns and best practices • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security • Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite • Effectively model threats and plan protection for IoT systems • Use Azure security tools for operations, incident response, and forensic investigation 

Table of Contents:
Chapter 1 Cloud security                                                                                                                  Cloud security considerations Compliance                                                                                                                 Risk management                                                                                                      Identity and access management                                                                          Operational security                                                                                                 Endpoint protection                                                                                                 Data protection                                                                                                          Shared responsibility Cloud computing                                                                                                       Distributed responsibility in public cloud computing                                      Assume breach and isolation Azure security architecture Azure design principles Chapter 2 Identity protection in Azure                                                                                   Authentication and authorization Azure hierarchy                                                                                                          Role-Based Access Control                                                                                     On-premises integration Azure AD Connect                                                                                                     Federation                                                                                                                   Suspicious activity identification Identity protection User risk policy                                                                                                           Sign-in risk policy                                                                                                       Notification enabling                                                                                                Vulnerabilities                                                                                                            Multi-Factor Authentication Azure Multi-Factor Authentication implementation                                        Azure Multi-Factor Authentication option configuration                                Chapter 3 Azure network security                                                                                              Anatomy of Azure networking Virtual network infrastructure                                                                               Network access control                                                                                           Routing tables                                                                                                            Remote access (Azure gateway/point-to-site VPN/ RDP/Remote PowerShell/SSH)                                                                             Cross-premises connectivity                                                                                  Network availability                                                                                                   Network logging                                                                                                         Public name resolution                                                                                            Network security appliances                                                                                  Reverse proxy                                                                                                            Azure Network Security best practices Subnet your networks based on security zones                                              Use Network Security Groups carefully                                                              Use site-to-site VPN to connect Azure Virtual Networks                               Configure host-based firewalls on IaaS virtual machines                                Configure User Defined Routes to control traffic                                            Require forced tunneling                                                                                        Deploy virtual network security appliances                                                       Create perimeter networks for Internet-facing devices                                 Use ExpressRoute                                                                                                     Optimize uptime and performance                                                                      Disable management protocols to virtual machines                                        Enable Azure Security Center                                                                                 Extend your datacenter into Azure                                                                        Chapter 4 Data and storage security                                                                                          Virtual machine encryption Azure Disk Encryption Storage encryption File share wire encryption Hybrid data encryption Authentication                                                                                                           Wire security                                                                                                              Data at rest                                                                                                                  Rights management Database security Azure SQL Firewall                                                                                                     SQL Always Encrypted                                                                                              Row-level security                                                                                                    Transparent data encryption                                                                                  Cell-level encryption                                                                                                Dynamic data masking                                                                                               Chapter 5 Virtual machine protection with Antimalware                                          Understanding the Antimalware solution Antimalware deployment Antimalware deployment to an existing VM                                                      Antimalware deployment to a new VM                                                               Antimalware removal                                                                                                 Chapter 6 Key management in Azure with Key Vault                                                     Key Vault overview App configuration for Key Vault Key Vault event monitoring Chapter 7 Azure resource management security                                                             Azure Security Center overview Detection capabilities                                                                                              Onboard resources in Azure Security Center Apply recommendations Resource security health                                                                                        Respond to security incidents Chapter 8 Internet of Things security                                                                                       Anatomy of the IoT Things of the world, unite                                                                                       Sensors, sensors everywhere                                                                               Big data just got bigger: TMI                                                                                    Artificial intelligence to the rescue                                                                       IoT security challenges IoT: Insecure by design                                                                                            Ramifications of an insecure IoT                                                                            IoT threat modeling Windows 10 IoT and Azure IoT Windows 10 IoT editions                                                                                        Azure IoT Suite and secure Azure IoT infrastructure                                         Chapter 9 Hybrid environment monitoring                                                                         Operations Management Suite Security and Audit solution overview Log Analytics configuration Windows Agent installation Resource monitoring using OMS Security and Audit solution Security state monitoring                                                                                        Identity and access control                                                                                     Alerts and threats                                                                                                       Chapter 10 Operations and management in the cloud                                                    Scenario Design considerations Azure Security Center for operations Azure Security Center for incident response Azure Security Center for forensics investigation Index                                                                                                                                         About the authors                                                                                                                  

About the Author :
YURI DIOGENES is a Senior Content Developer on the CSI Enterprise Mobility and Security Team, focusing on enterprise mobility solutions, Azure Security Center, and OMS Security. Previously, Yuri worked at Microsoft as a writer for the Windows Security team and as a Support Escalation Engineer for the CSS Forefront team. He has a Master of Science degree in Cybersecurity Intelligence and Forensics from Utica College and an MBA from FGF in Brazil, and he holds several industry certifications. He is co-author of Enterprise Mobility Suite–Managing BYOD and Company-Owned Devices (Microsoft Press, 2015), Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion (Microsoft Press, 2010), and three other Forefront titles from Microsoft Press. DR. THOMAS SHINDER is a program manager in Azure Security Engineering and a 20-year veteran in IT security. Tom is best known for his work with ISA Server and TMG, publishing nine books on those topics. He was also the leading voice at ISAserver.org. After joining Microsoft in 2009, Tom spent time on the UAG DirectAccess team and then took a 3-year vacation from security to be a cloud infrastructure specialist and architect. He’s now back where he belongs in security, and spends a good deal of time hugging his Azure Security Center console and hiding his secrets in Azure Key Vault. DEBRA LITTLEJOHN SHINDER, MCSE, is a former police officer and police academy instructor who is self-employed as a technol¿ogy consultant, trainer, and writer, specializing in network and cloud security. She has authored a number of books, including Scene of the Cybercrime: Computer Forensics Handbook (Syngress Publishing, 2002) and Computer Networking Essentials (Cisco Press, 2001). She has co-authored more than 20 additional books and worked as a tech editor, developmental editor, and contributor to more than 15 books. Deb is a lead author for WindowSecurity.com and WindowsNetworking.com, and a long-time contributor to the GFI Software blog and other technology publications, with more than 1,500 published articles in print magazines and on websites. Deb focuses on Microsoft products, and has been awarded the Microsoft MVP (Most Valuable Professional) award in the field of enterprise security for 14 years in a row. She lives and works in the Dallas-Fort Worth area and has taught law enforcement, computer networking, and security courses at Eastfield College in Mesquite, Texas. She currently sits on the advisory board of the Eastfield Criminal Justice Training Center Police Academy.  


Best Sellers


Product Details
  • ISBN-13: 9781509304035
  • Publisher: Microsoft Press,U.S.
  • Publisher Imprint: Microsoft Press
  • Language: English
  • ISBN-10: 1509304037
  • Publisher Date: 25 Aug 2016
  • Binding: Digital download
  • Series Title: IT Best Practices - Microsoft Press


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)
Microsoft Press,U.S. -
Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Microsoft Azure Security Infrastructure: (IT Best Practices - Microsoft Press)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!