Choose an application
Local transit --- Transportation --- Security measures --- Security measures
Choose an application
Airlines --- Aeronautics, Commercial --- Security measures --- Security measures
Choose an application
Computer networks --- Security measures --- Internet --- Security measures
Choose an application
'Microsoft Azure Security Technologies (AZ-500) - A Certification Guide' is a certification guide that helps IT professionals to start their careers as Azure Security Specialists by clearing the AZ-500 certification and proving their knowledge of Azure security services. Authored by an Azure security professional, this book takes readers through a series of steps to gain a deeper insight into Azure security services. This book will help readers to understand key concepts of the Azure AD architecture and various methods of hybrid authentication. It will help readers to use Azure AD security solutions like Azure MFA, Conditional Access, and PIM. It will help readers to maintain various industry standards for an Azure environment through Azure Policies and Azure Blueprints. This book will also help to build a secure Azure network using Azure VPN, Azure Firewall, Azure Front Door, Azure WAF, and other services. It will provide readers with a clear understanding of various security services, including Azure Key vault, Update management, Microsoft Endpoint Protection, Azure Security Center, and Azure Sentinel in detail.
Computer networks --- Security measures. --- Security measures --- Examinations
Choose an application
Computer networks --- Security measures --- Security measures.
Choose an application
Internet --- Computer networks --- Security measures --- Security measures.
Choose an application
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Computer networks --- Cyberspace --- Security measures. --- Security measures.
Choose an application
Choose an application
Choose an application