Mastering identity and access management with Microsoft Azure : empower users by managing protecting identities and data / Jochen Nickel.
Tipo de material: TextoIdioma: Inglés Detalles de publicación: Birmingham, UK : Packt, 2019.Edición: Second editionDescripción: vii, 682 páginas : ilustradas ; 23 cmISBN:- 9781789132304
- QA 76 .585 .N53 2019
Tipo de ítem | Biblioteca actual | Signatura | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|
Monografía - Colección General | SUCURSAL JUAN PABLO DUARTE Area Administrativa | QA 76 .585 .N53 2019 (Navegar estantería(Abre debajo)) | Disponible | 1051365 |
Navegando Biblioteca «Juan Pablo Duarte» estanterías, Ubicación en estantería: Area Administrativa Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA 76 .585 .D56 2016 Microsoft Azure security infrastructure / | QA 76 .585 .M35 2020 (ISC)2 CCSP certified cloud security professional : official study guide / | QA 76 .585 .M355 2020 (ISC)2 CCSP certified cloud security professional : official practice tests / | QA 76 .585 .N53 2019 Mastering identity and access management with Microsoft Azure : empower users by managing protecting identities and data / | QA 76 .585 .S68 2015 Microsoft Azure storage essentials : harness the power of Microsoft Azure services to build efficient cloud solutions / | QA 76 .585 .T45 2015 Developing Microsoft Azure solutions : exam ref 70-532 / | QA 76 .585 .T67 2020 Mastering Azure Security : Safeguard your Azure workload with innovative cloud security measures / |
Material de apoyo. Departamento de Seguridad Cibernética y de la Información.
Chapter 1. Building and Managing Azure Active Directory, 11. -- Chapter 2. Understanding Identity Synchronization, 79. -- Chapter 3. Exploring Advanced Synchronization Concepts, 147. -- Chapter 4. Monitoring Your Identity Bridge, 193. -- Chapter 5. Configuring and Managing Identity Protection, 217. -- Chapter 6. Managing Authentication Protocols, 249. -- Chapter 7. Deploying Solutions on Azure AD and ADFS, 275. -- Chapter 8. Using the Azure AD App Proxy and the Web Application Proxy, 319. -- Chapter 9. Deploying Additional Applications on Azure AD, 367. -- Chapter 10. Exploring Azure AD Identity Services, 399. -- Chapter 11. Creating Identity Life Cycle Management on Azure, 445. -- Chapter 12. Creating a New Security Culture, 491. -- Chapter 13. Identifying and Detecting Sensitive Data, 519. -- Chapter 14. Understanding Encryption Key Management Strategies, 565. -- Chapter 15. Configuring Azure Information Protection Solutions, 609. -- Chapter 16. Azure Information Protection Development Overview, 653.
No hay comentarios en este titulo.