Michael Howard, Heinrich Gantenbein, Simone Curzi

Designing and Developing Secure Azure Solutions

eBook Ausgabe. Empfohlen von 18 bis 67 Jahre. 1. Auflage. Sprachen: Englisch
eBook (epub), 528 Seiten
EAN 9780137908684
Veröffentlicht Dezember 2022
Verlag/Hersteller Pearson ITP

Auch erhältlich als:

Buch (Softcover)
41,72
45,49 inkl. MwSt.
Sofort Lieferbar (Download)
Teilen
Beschreibung

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers- taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: - Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code - Apply security patterns to solve common problems more easily - Model threats early, to plan effective mitigations - Implement modern identity solutions with OpenID Connect and OAuth2 - Make the most of Azure monitoring, logging, and Kusto queries - Safeguard workloads with Azure Security Benchmark (ASB) best practices - Review secure coding principles, write defensive code, fix insecure code, and test code security - Leverage Azure cryptography and confidential computing technologies - Understand compliance and risk programs - Secure CI / CD automated workflows and pipelines - Strengthen container and network security

Portrait

Michael Howard is a 30-year Microsoft veteran and is currently a Principal Security Program Manager in the Azure Data Platform team, working on security engineering. He is one of the original architects of the Microsoft Security Development Lifecycle and has helped diverse customers such as government, military, education, finance, and healthcare secure their Azure workloads. He was the application security lead for the Rio 2016 Olympic games, which were hosted on Azure. Heinrich Gantenbein is a Senior Principal Consultant on Cybersecurity in Microsoft's Industry Solutions Delivery. With 30+ years of experience in software engineering and more than 30 years of experience in consulting, he brings a wealth of practical know-how to his role. Heinrich specializes in Azure security, threat modeling, and DevSecOps. Simone Curzi is a Principal Consultant from Microsoft's Industry Solutions Delivery. He has 20+ years of experience covering various technical roles in Microsoft and has fully devoted himself to security for more than 10 years. A renowned threat modeling and Microsoft Security Development Lifecycle expert, Simone is a regular speaker at international conferences such as Microsoft Ready, Microsoft Spark, (ISC)2 Security Congress, Carnegie Mellon's SEI DevOps Days, and Security Compass Equilibrium. Simone is also author of an open source threat modeling tool, Threats Manager Studio.

Inhaltsverzeichnis

PART I SECURITY PRINCIPLES CHAPTER 1 Secure development lifecycle processes CHAPTER 2 Secure design CHAPTER 3 Security patterns CHAPTER 4 Threat modeling CHAPTER 5 Identity, authentication, and authorization CHAPTER 6 Monitoring and auditing CHAPTER 7 Governance CHAPTER 8 Compliance and risk programs PART II SECURE IMPLEMENTATION CHAPTER 9 Secure coding CHAPTER 10 Cryptography in Azure CHAPTER 11 Confidential computing CHAPTER 12 Container security CHAPTER 13 Database security CHAPTER 14 CI/CD security CHAPTER 15 Network security Appendix A: Core cryptographic techniques

Technik
Sie können dieses eBook zum Beispiel mit den folgenden Geräten lesen:
• tolino Reader 
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions. 
• Sony Reader & andere eBook Reader 
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte. 
• Tablets & Smartphones 
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets. 
• PC & Mac 
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ -  „Sofort online lesen über Meine Bibliothek“.
 
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.
Hersteller
Libri GmbH
Friedensallee 273

DE - 22763 Hamburg

E-Mail: GPSR@libri.de

Website: www.libri.de

Das könnte Sie auch interessieren

Verena Keßler
Gym
eBook (epub)
Sofort lieferbar (Download)
16,99
Gabriel Yoran
Die Verkrempelung der Welt
eBook (epub)
Sofort lieferbar (Download)
18,99
Dorothee Elmiger
Aus der Zuckerfabrik
eBook (epub)
Sofort lieferbar (Download)
13,99
Aya Jaff
Broligarchie
eBook (epub)
Sofort lieferbar (Download)
19,99
Max Tegmark
Leben 3.0
eBook (epub)
Sofort lieferbar (Download)
14,99
Sarah Stein Lubrano
Don't Talk About Politics
eBook (epub)
Sofort lieferbar (Download)
15,99
Sofort lieferbar (Download)
19,99
Sofort lieferbar (Download)
0,00
Nicole Mayer-Ahuja
Klassengesellschaft akut
eBook (epub)
Sofort lieferbar (Download)
22,99
Sofort lieferbar (Download)
0,00
Heike Geißler
Arbeiten
eBook (epub)
Sofort lieferbar (Download)
14,99
Benjamín Labatut
MANIAC
eBook (epub)
Sofort lieferbar (Download)
13,99
Claus Kühnel
Meshtastic
eBook (epub)
Sofort lieferbar (Download)
23,92
Elisa Hoven
Das Ende der Wahrheit?
eBook (epub)
Sofort lieferbar (Download)
18,99
Jean-Remy von Matt
Am Ende
eBook (epub)
Sofort lieferbar (Download)
19,99
Benjamín Labatut
Das blinde Licht
eBook (epub)
Sofort lieferbar (Download)
11,99
Hans Rosling
Factfulness
eBook (epub)
Sofort lieferbar (Download)
18,99
Sofort lieferbar (Download)
0,00
Robert Menasse
Die Hauptstadt
eBook (epub)
Sofort lieferbar (Download)
13,99
David Graeber
Bullshit Jobs
eBook (epub)
Sofort lieferbar (Download)
13,99
Mirjam Müller
Promotion - Postdoc - Professur
eBook (pdf)
Sofort lieferbar (Download)
26,99
Martin Schröder
Wann sind Frauen wirklich zufrieden?
eBook (epub)
Sofort lieferbar (Download)
14,99
Tillmann Bendikowski
Hitlerwetter
eBook (epub)
Sofort lieferbar (Download)
12,99
Christian Westphalen
Die große Fotoschule
eBook (pdf)
Sofort lieferbar (Download)
35,92
Jürgen Wolf
DxO PhotoLab
eBook (epub)
Sofort lieferbar (Download)
27,92
Sofort lieferbar (Download)
14,99
Bill Gates
Source Code
eBook (epub)
Sofort lieferbar (Download)
19,99
Simone Hoffmann
Fotografieren lernen von A bis Z
eBook (pdf)
Sofort lieferbar (Download)
23,92
Maria Neubauer
Korruption und Schattenwirtschaft
eBook (epub)
Sofort lieferbar (Download)
0,00
Jens Andersen
Die LEGO-Story
eBook (epub)
Sofort lieferbar (Download)
19,99
Nicole Mayer-Ahuja
Klassengesellschaft akut
eBook (pdf)
Sofort lieferbar (Download)
22,99
Rüdiger Maas
Generation arbeitsunfähig
eBook (epub)
Sofort lieferbar (Download)
14,99
Jimmy Wales
TRUST
eBook (epub)
Sofort lieferbar (Download)
23,99
Maike Jarsetz
Lightroom Classic
eBook (pdf)
Sofort lieferbar (Download)
39,92
Simon Schaupp
Stoffwechselpolitik
eBook (epub)
Sofort lieferbar (Download)
19,99
Michio Kaku
Abschied von der Erde
eBook (epub)
Sofort lieferbar (Download)
12,99