Bild 1 von 1

Galerie
Bild 1 von 1

Identitäts- und Zugriffsmanagement mit Microsoft Azure beherrschen: Benutzer stärken durch-
US $75,00
Ca.EUR 65,66
Artikelzustand:
“Close to like new with only minor shelf wear.”
Sehr gut
Buch, das nicht neu aussieht und gelesen wurde, sich aber in einem hervorragenden Zustand befindet. Der Einband weist keine offensichtlichen Beschädigungen auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos USPS Ground Advantage®.
Standort: Groton, Massachusetts, USA
Lieferung:
Lieferung zwischen Fr, 13. Jun und Mi, 18. Jun nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Kostenloser Rückversand.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:285633354316
Artikelmerkmale
- Artikelzustand
- Sehr gut
- Hinweise des Verkäufers
- “Close to like new with only minor shelf wear.”
- ISBN
- 9781789132304
Über dieses Produkt
Product Identifiers
Publisher
Packt Publishing, The Limited
ISBN-10
1789132304
ISBN-13
9781789132304
eBay Product ID (ePID)
14038651957
Product Key Features
Number of Pages
698 Pages
Publication Name
Mastering Identity and Access Management with Microsoft Azure : Empower Users by Managing and Protecting Identities and Data, 2nd Edition
Language
English
Publication Year
2019
Subject
Software Development & Engineering / General, Cloud Computing, Security / General, System Administration / Disaster & Recovery, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Length
3.6 in
Item Width
3 in
Additional Product Features
Edition Number
2
Intended Audience
Trade
Table Of Content
Table of Contents Building and Managing Azure Active Directory Understanding Identity Synchronization Exploring Advanced Synchronization Concepts Monitoring Your Identity Bridge Configuring and Managing Identity Protection Managing Authentication Protocols Deploying Solutions on Azure AD and ADFS Using the Azure AD App Proxy and the Web Application Proxy Deploying Additional Applications on Azure AD Exploring Azure AD Identity Services Creating Identity Life Cycle Management on Azure Creating a New Security Culture Identifying and Detecting Sensitive Data Understanding Encryption Key Management Strategies Configuring Azure Information Protection Solutions Azure Information Protection Development Overview
Synopsis
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up-to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions., With the digital transformation many organizations are currently going through, they realize that the statement " Identity is the new control plane and new perimeter" is not just fiction, it's reality. This book is a crisp and clear, hands-on guide with project scenarios tailored to help you solve real challenges in the field of Identity and ..., Master powerful strategies to acquire and analyze evidence from real-life scenarios Key Features A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Book Description Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and """"""""plays"""""""" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platforms Who This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
BWO Fly
99,5% positive Bewertungen•31.206 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (9.238)
- 1***n (244)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufReceived this UTC Ultra Wire Brassie. The Ultra Wire were of high quality. I'm very happy with my purchase and will continue to order from this seller. This seller has the best communications that I have ever seen in a sell. The Ultra Wire were at a great value. The Ultra Wire were as described and in excellent condition. Shipping was very fast. The appearance of the Ultra Wire were excellent. The item was very well packaged. Again, I will continue buy from this sell.UTC Ultra Wire BRASSIE (Nr. 284450533065)
- 6***r (56)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufAlways fast shipping from this reliable seller. The bead quality is outstanding. The size is more consistent than other brands and the price is on point. I appreciate the effort BWO puts into its products, packaging, and swift shipment.
- 1***7 (687)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufFast shipping , excellent packaging , item as pictured and described . A 10 pk of tungsten 3/16 fly tying dumbbells. Good Seller , would buy from again , ThanksTungsten Fish Eye Dumbbells for Fly Tying - 10 Pack (Nr. 284601344731)