Imagen 1 de 1

Galería
Imagen 1 de 1

Mastering Identity and Access Management with Microsoft Azure : Empower Users by
USD75,00
Aproximadamente65,81 EUR
Estado:
“Close to like new with only minor shelf wear.”
En muy buen estado
Libro que se ha leído y que no tiene un aspecto nuevo, pero que está en un estado excelente. No hay desperfectos visibles en la tapa y se incluye sobrecubierta, si procede, para las tapas duras. Todas las páginas están en perfecto estado, sin arrugas ni roturas y no falta ninguna. El texto no está subrayado ni resaltado de forma alguna, y no hay anotaciones en los márgenes. Puede presentar marcas de identificación mínimas en la contraportada o las guardas. Muy poco usado. Consulta el anuncio del vendedor para obtener más información y la descripción de cualquier posible imperfección.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Envío:
Gratis USPS Ground Advantage®.
Ubicado en: Groton, Massachusetts, Estados Unidos
Entrega:
Entrega prevista entre el jue. 12 jun. y el mié. 18 jun. a 94104
Devoluciones:
30 días para devoluciones. El vendedor paga el envío de la devolución.
Pagos:
Compra con confianza
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:285633354316
Última actualización el 24 ene 2024 03:05:17 H.EspVer todas las actualizacionesVer todas las actualizaciones
Características del artículo
- Estado
- En muy buen estado
- Notas del vendedor
- “Close to like new with only minor shelf wear.”
- ISBN
- 9781789132304
Acerca de este producto
Product Identifiers
Publisher
Packt Publishing, The Limited
ISBN-10
1789132304
ISBN-13
9781789132304
eBay Product ID (ePID)
14038651957
Product Key Features
Number of Pages
698 Pages
Publication Name
Mastering Identity and Access Management with Microsoft Azure : Empower Users by Managing and Protecting Identities and Data, 2nd Edition
Language
English
Publication Year
2019
Subject
Software Development & Engineering / General, Cloud Computing, Security / General, System Administration / Disaster & Recovery, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Length
3.6 in
Item Width
3 in
Additional Product Features
Edition Number
2
Intended Audience
Trade
Table Of Content
Table of Contents Building and Managing Azure Active Directory Understanding Identity Synchronization Exploring Advanced Synchronization Concepts Monitoring Your Identity Bridge Configuring and Managing Identity Protection Managing Authentication Protocols Deploying Solutions on Azure AD and ADFS Using the Azure AD App Proxy and the Web Application Proxy Deploying Additional Applications on Azure AD Exploring Azure AD Identity Services Creating Identity Life Cycle Management on Azure Creating a New Security Culture Identifying and Detecting Sensitive Data Understanding Encryption Key Management Strategies Configuring Azure Information Protection Solutions Azure Information Protection Development Overview
Synopsis
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up-to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions., With the digital transformation many organizations are currently going through, they realize that the statement " Identity is the new control plane and new perimeter" is not just fiction, it's reality. This book is a crisp and clear, hands-on guide with project scenarios tailored to help you solve real challenges in the field of Identity and ..., Master powerful strategies to acquire and analyze evidence from real-life scenarios Key Features A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Book Description Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and """"""""plays"""""""" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platforms Who This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.
Descripción del artículo del vendedor
Información de vendedor profesional
Acerca de este vendedor
BWO Fly
99,5% de votos positivos•31 mil artículos vendidos
Registrado como vendedor profesional
Votos de vendedor (9.238)
- 1***n (244)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaReceived this UTC Ultra Wire Brassie. The Ultra Wire were of high quality. I'm very happy with my purchase and will continue to order from this seller. This seller has the best communications that I have ever seen in a sell. The Ultra Wire were at a great value. The Ultra Wire were as described and in excellent condition. Shipping was very fast. The appearance of the Ultra Wire were excellent. The item was very well packaged. Again, I will continue buy from this sell.UTC Ultra Wire BRASSIE (#284450533065)
- 6***r (56)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaAlways fast shipping from this reliable seller. The bead quality is outstanding. The size is more consistent than other brands and the price is on point. I appreciate the effort BWO puts into its products, packaging, and swift shipment.
- 1***7 (687)- Votos emitidos por el comprador.Últimos 6 mesesCompra verificadaFast shipping , excellent packaging , item as pictured and described . A 10 pk of tungsten 3/16 fly tying dumbbells. Good Seller , would buy from again , ThanksTungsten Fish Eye Dumbbells for Fly Tying - 10 Pack (#284601344731)