Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Microsoft Azure Security Center
  • Language: en
  • Pages: 298

Microsoft Azure Security Center

Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you’ll learn how to save hours, days, or even w...

Cybersecurity - Attack and Defense Strategies
  • Language: en
  • Pages: 368

Cybersecurity - Attack and Defense Strategies

Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system Book DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of ...

Exam Ref SC-200 Microsoft Security Operations Analyst
  • Language: en
  • Pages: 518

Exam Ref SC-200 Microsoft Security Operations Analyst

Prepare for Microsoft Exam SC-200—and help demonstrate your real-world mastery of skills and knowledge required to work with stakeholders to secure IT systems, and to rapidly remediate active attacks. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Mitigate threats using Microsoft 365 Defender Mitigate threats using Microsoft Defender for Cloud Mitigate threats using Microsoft Sentinel This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you h...

Microsoft Azure Security Infrastructure
  • Language: en
  • Pages: 338

Microsoft Azure Security Infrastructure

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure,1/e three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enf...

Windows Server 2012 Security from End to Edge and Beyond
  • Language: en
  • Pages: 543

Windows Server 2012 Security from End to Edge and Beyond

  • Type: Book
  • -
  • Published: 2013-04-18
  • -
  • Publisher: Newnes

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologi...

Microsoft Azure Sentinel
  • Language: en
  • Pages: 351

Microsoft Azure Sentinel

Microsoft Azure Sentinel Plan, deploy, and operate Azure Sentinel, Microsoft’s advanced cloud-based SIEM Microsoft’s cloud-based Azure Sentinel helps you fully leverage advanced AI to automate threat identification and response – without the complexity and scalability challenges of traditional Security Information and Event Management (SIEM) solutions. Now, three of Microsoft’s leading experts review all it can do, and guide you step by step through planning, deployment, and daily operations. Leveraging in-the-trenches experience supporting early customers, they cover everything from configuration to data ingestion, rule development to incident management… even proactive threat hun...

Building a Career in Cybersecurity
  • Language: en
  • Pages: 196

Building a Career in Cybersecurity

THE INSIDER'S GUIDE TO LAUNCHING AND ACCELERATING YOUR CYBERSECURITY CAREER Cybersecurity is one of the world's fastest growing, most exciting fields--but that doesn't mean it's easy to enter the industry and succeed. Now there's a complete guide to creating a great cybersecurity career, whether you're migrating to cybersecurity from another field or already a cybersecurity professional. Building a Career in Cybersecurity doesn't teach detailed technical skills you can get from a thousand books and videos. Instead, Yuri Diogenes focuses on make-or-break knowledge you won't find elsewhere: personal strategy, planning, process, mindset, and the critical “soft skills” today's employers are ...

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
  • Language: en
  • Pages: 419

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals

  • Type: Book
  • -
  • Published: 2021-12-04
  • -
  • Publisher: Exam Ref

Prepare for Microsoft Exam SC-900 and help demonstrate your real-world knowledge of the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. Designed for business stakeholders, new and existing IT professionals, functional consultants, and students, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Security, Compliance, and Identity Fundamentals level. Focus on the expertise measured by these objectives: * Describe the concepts of security, compliance, and identity * Describe the capabilities of Microsoft identity and access management solutions * Describe the capabil...

Cybersecurity – Attack and Defense Strategies
  • Language: en
  • Pages: 635

Cybersecurity – Attack and Defense Strategies

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key FeaturesCovers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much moreBook Description Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, coverin...

Becoming the Hacker
  • Language: en
  • Pages: 405

Becoming the Hacker

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key FeaturesBuilds on books and courses on penetration testing for beginnersCovers both attack and defense perspectivesExamines which tool to deploy to suit different applications and situationsBook Description Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense a...