55,58 €
65,39 €
Designing & Developing Secure Azure Solutions
Designing & Developing Secure Azure Solutions
55,58 €
65,39 €
  • Išsiųsime per 10–14 d.d.
Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience se…
55.58 2025-07-06 23:59:00
  • Extra -15 % nuolaida šiai knygai su kodu: ENG15

Designing & Developing Secure Azure Solutions + nemokamas atvežimas! | knygos.lt

Atsiliepimai

(5.00 Goodreads įvertinimas)

Aprašymas

Plan, build, and maintain highly secure Azure applications and workloads

As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers-- taking you from design and development to testing, deployment, governance, and compliance.

About You

This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible.

Discover powerful new ways to:

Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security

EXTRA 15 % nuolaida

55,58 €
65,39 €
Išsiųsime per 10–14 d.d.

Kupono kodas: ENG15

Akcija baigiasi už 2d.23:14:21

Nuolaidos kodas galioja perkant nuo 10 €. Nuolaidos nesumuojamos.

Prisijunkite ir už šią prekę
gausite 0,65 Knygų Eurų!?
Įsigykite dovanų kuponą
Daugiau

Plan, build, and maintain highly secure Azure applications and workloads

As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers-- taking you from design and development to testing, deployment, governance, and compliance.

About You

This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible.

Discover powerful new ways to:

Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security

Atsiliepimai

  • Atsiliepimų nėra
0 pirkėjai įvertino šią prekę.
5
0%
4
0%
3
0%
2
0%
1
0%
[{"option":"58","probability":13,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e599c86b351751013788.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"57","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e5981e89e41751013761.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"56","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e59691dc2d1751013737.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"55","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e590bade881751013643.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"54","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58f20a7761751013618.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"53","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58d20c1ee1751013586.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"52","probability":14.5,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58b358b2e1751013555.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"51","probability":0.5,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e57cded6da1751013325.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}}]