MARC details
000 -LEADER |
fixed length control field |
02625nam a22002417a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220817b2019 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781484277089 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 LAK-V |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Lakshmi, Vasantha |
245 ## - TITLE STATEMENT |
Title |
Beginning security with Microsoft technologies : |
Remainder of title |
protecting Office 365, devices, and data / |
Statement of responsibility, etc. |
Vasantha Lakshmi |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc. |
India |
Name of publisher, distributor, etc. |
Apress |
Date of publication, distribution, etc. |
2019 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
235 p. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
999.00. |
500 ## - GENERAL NOTE |
General note |
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning Security with Microsoft Technologies begins with an introduction to some common security challenges and then discusses options for addressing them. You will learn about Office Advanced Threat Protection (ATP), the importance of device-level security, and about various products such as Device Guard, Intune, Windows Defender, and Credential Guard. As part of this discussion you'll cover how secure boot can help an enterprise with pre-breach scenarios. Next, you will learn how to set up Office 365 to address phishing and spam, and you will gain an understanding of how to protect your company's Windows devices. Further, you will also work on enterprise-level protection, including how advanced threat analytics aids in protection at the enterprise level. Finally, you'll see that there are a variety of ways in which you can protect your information. After reading this book you will be able to understand the security components involved in your infrastructure and apply methods to implement security solutions. What You Will Learn Keep corporate data and user identities safe and secure Identify various levels and stages of attacks Safeguard information using Azure Information Protection, MCAS, and Windows Information Protection, regardless of your location Use advanced threat analytics, Azure Security Center, and Azure ATP Who This Book Is For Administrators who want to build secure infrastructure at multiple levels such as email security, device security, cloud infrastructure security, and more. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Microsoft Office |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Security systems |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Business enterprises--Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology--Management |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security--Computer programs |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Microsoft software |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
Withdrawn status |
|