Designing and Developing Secure Azure Solutions

Designing and Developing Secure Azure Solutions
Author :
Publisher : Microsoft Press
Total Pages : 1057
Release :
ISBN-10 : 9780137908684
ISBN-13 : 0137908687
Rating : 4/5 (687 Downloads)

Book Synopsis Designing and Developing Secure Azure Solutions by : Michael Howard

Download or read book Designing and Developing Secure Azure Solutions written by Michael Howard and published by Microsoft Press. This book was released on 2022-12-05 with total page 1057 pages. Available in PDF, EPUB and Kindle. Book excerpt: Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers— taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security


Designing and Developing Secure Azure Solutions Related Books

Designing and Developing Secure Azure Solutions
Language: en
Pages: 1057
Authors: Michael Howard
Categories: Computers
Type: BOOK - Published: 2022-12-05 - Publisher: Microsoft Press

DOWNLOAD EBOOK

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they
Exam Ref 70-532 Developing Microsoft Azure Solutions
Language: en
Pages: 433
Authors: Zoiner Tejada
Categories: Computers
Type: BOOK - Published: 2015-02-20 - Publisher: Microsoft Press

DOWNLOAD EBOOK

Prepare for Microsoft Exam 70-532--and help demonstrate your real-world mastery of Microsoft Azure solution development. Designed for experienced developers rea
Azure for Architects
Language: en
Pages: 699
Authors: Ritesh Modi
Categories: Computers
Type: BOOK - Published: 2020-07-17 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Build and design multiple types of applications that are cross-language, platform, and cost-effective by understanding core Azure principles and foundational co
Microsoft Azure Infrastructure Services for Architects
Language: en
Pages: 448
Authors: John Savill
Categories: Computers
Type: BOOK - Published: 2019-10-29 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

An expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure With Microsoft Azure challenging Ama
Azure Security Handbook
Language: en
Pages: 0
Authors: Karl Ots
Categories:
Type: BOOK - Published: 2021 - Publisher:

DOWNLOAD EBOOK

Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alo