×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mark Dunkerley, Matt Tumbarello

(ebook) (audiobook) (audiobook) Książka w języku 1
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mark Dunkerley, Matt Tumbarello - okladka książki

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mark Dunkerley, Matt Tumbarello - okladka książki

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mark Dunkerley, Matt Tumbarello - audiobook MP3

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mark Dunkerley, Matt Tumbarello - audiobook CD

Autorzy:
Mark Dunkerley, Matt Tumbarello
Serie wydawnicze:
Learning
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
816
Dostępne formaty:
     PDF
     ePub
Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.
The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you’ll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you’ll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing.
By the end of this book, you’ll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.

Wybrane bestsellery

O autorach książki

Mark Dunkerley is currently the manager of messaging, mobile, and video services at the Adventist Health System. He was born in Newcastle upon Tyne, England and currently resides in Orlando, Florida. He holds a bachelor's degree of science in business administration and a master's in business administration. He has worked in the technology field for over 12 years and has experience in several technical areas. He has earned certifications from AirWatch, Microsoft, CompTIA, VMware, AXELOS, Cisco, and EMC. Mark is currently involved with unified communication and mobility strategies and deployments in his current role. He recently spoke at several conferences for AirWatch and Microsoft and published several case studies. To view more information on the work Mark has done, you can visit his LinkedIn profile at www.linkedin.com/in/markdunkerley.
Matt Tumbarello is a senior solutions architect. He has extensive experience working with the Microsoft security stack, Azure, Microsoft 365, Intune, Configuration Manager, and virtualization technologies. He also has a background working directly with Fortune 500 executives in a technical enablement role. Matt has published reviews for Azure security products, privileged access management vendors, and mobile threat defense solutions. He also holds several Microsoft certifications.

Zobacz pozostałe książki z serii Learning

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
161,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.