Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.
Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.
What You’ll Learn
Manage security with the Azure Security Center and the Office 365 Compliance Center
Configure information protection for document and electronic communications
Monitor security for your business in the cloud
Understand Mobile Application Management (MAM) and Mobile Device Management (MDM)
Prevent data loss in Office 365
Configure and manage the compliance manager tools for NIST and GDPR
Who This Book Is For
IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business
Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses...
This book is a practical guide to Microsoft’s Azure Kubernetes Service (AKS), a container
orchestration platform. The goal of this book is to take the reader from 0 to 100 deploying
and running a Kubernetes cluster on Microsoft Azure cloud. For anyone embarking
on this book, it is ideal to have experience in the...
Grow it, cook it, eat it! From the vegetable patch to the dinner table
Put off by the origin-unknown, not-so-fresh, pesticide-laden offerings at the grocery store? Hungry for delicious high-quality veg and fragrant herbs, and looking to have some control over where your food comes from but never planted a seed in...
Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there.
However, more experienced Linux users can begin with this volume and download an...
Get started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications.
Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease. Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...