Rejoignez-nous pour un voyage dans le monde des livres!
Ajouter ce livre à l'électronique
Grey
Ecrivez un nouveau commentaire Default profile 50px
Grey
Abonnez-vous pour lire le livre complet ou lisez les premières pages gratuitement!
All characters reduced
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide - Manage monitor and respond to threats using Microsoft Security Stack for securing IT systems - cover

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide - Manage monitor and respond to threats using Microsoft Security Stack for securing IT systems

Joe Anich, Trevor Stuart

Maison d'édition: Packt Publishing

  • 0
  • 0
  • 0

Synopsis

Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.
Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.
By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.
Disponible depuis: 16/03/2022.
Longueur d'impression: 288 pages.

D'autres livres qui pourraient vous intéresser

  • Designing for Democracy - How to Build Community in Digital Environments - cover

    Designing for Democracy - How to...

    Jennifer Forestal

    • 0
    • 0
    • 0
    How should we "fix" digital technologies to support democracy instead of undermining it? In Designing for Democracy, Jennifer Forestal argues that accurately evaluating the democratic potential of digital spaces means studying how the built environment—a primary component of our "modern public square"—structures our activity, shapes our attitudes, and supports the kinds of relationships and behaviors democracy requires. 
     
     
     
    While many scholars and practitioners are attentive to the role of design in shaping behavior, they have yet to fully engage with the question of what structures are required to support democratic communities—and how to build them. Forestal closes this gap by providing a new theory of democratic space. Drawing from a wide range of disciplines, she argues that "democratic spaces" must be designed with three environmental characteristics—boundaries, durability, and flexibility—that, taken together, afford users the ability to engage in fundamental civic practices. 
     
     
     
    Through extended analyses of Facebook, Twitter, and Reddit, Forestal shows precisely how well these digital platforms meet the criteria for democratic spaces, or whether they do so at all. The result is a nuanced analysis of the democratic communities that form—or fail to emerge—in these spaces, as well as more concrete suggestions for how to improve them.
    Voir livre
  • The Code of Honor - Embracing Ethics in Cybersecurity - cover

    The Code of Honor - Embracing...

    Ed Skoudis, Paul J. Maurer

    • 0
    • 0
    • 0
    While some professions—including medicine, law, and engineering—have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. 
     
     
     
    The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, president of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, president of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. 
     
     
     
    This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies—called Critical Applications—at the end of each chapter that help the listener determine how to apply the hands-on skills described in the book.
    Voir livre
  • The DevSecOps Playbook - Deliver Continuous Security at Speed - cover

    The DevSecOps Playbook - Deliver...

    Sean D. Mack

    • 0
    • 0
    • 0
    An essential and up-to-date guide to DevSecOps 
     
     
     
    In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks. 
     
     
     
    The book explains why it's important to shift security considerations to the front-end of the development cycle and how to do that, as well as describing the evolution of the standard security model over the last few years and how that has impacted modern cybersecurity. 
     
     
     
    A must-listen roadmap to DevSecOps for practicing security engineers, security leaders, and privacy practitioners, The DevSecOps Playbook will also benefit students of information technology and business, as well as governance, risk, and compliance specialists who want to improve their understanding of cybersecurity's impact on their organizations.
    Voir livre
  • Meat Me Halfway - How Changing the Way We Eat Can Improve Our Lives and Save Our Planet - cover

    Meat Me Halfway - How Changing...

    Brian Kateman, Bill McKibben

    • 0
    • 0
    • 0
    We know that eating animals is bad for the planet and bad for our health, and yet we do it anyway. Ask anyone in the plant-based movement and the solution seems obvious: stop eating meat. But, for many people, that stark solution is neither appealing nor practical. In Meat Me Halfway, author and founder of the reducetarian movement Brian Kateman puts forth a realistic and balanced goal: mindfully reduce your meat consumption. It might seem strange for a leader of the plant-based movement to say, but meat is here to stay. The question is not how to ween society off meat but how to make meat more healthy, more humane, and more sustainable. In this book, Kateman answers the question that has plagued vegans for years: why are we so resistant to changing the way we eat, and what can we do about it? Exploring our historical relationship with meat, from the domestication of animals to the early industrialization of meatpacking, to the advent of the one-stop grocery store, the science of taste, and the laws that impact our access to food, Meat Me Halfway reveals how humans have evolved as meat-eaters. Featuring interviews with pioneers in the science of meat alternatives, investigations into new types of farming designed to lessen environmental impact, and innovations in ethical and sustainable agriculture, this down-to-earth book shows that we all can change the way we create and consume food.
    Voir livre
  • Why the Dose Matters - Assessing the Health Risk of Exposure to Toxicants - cover

    Why the Dose Matters - Assessing...

    Urs A. Boelsterli

    • 0
    • 0
    • 0
    Each day we are exposed to a myriad of natural and human-made chemicals in our food, drinking water, air, soil, at home or at the workplace—pesticide residues, food additives, drugs, household products—but how can we gauge the human health risk posed by these chemicals? Should we believe the somber headlines that depict a serious threat for humans and the environment, or should we follow the reassuring voices of others who claim that the angst is totally unfounded? 
     
     
     
    Why the Dose Matters: Assessing the Health Risk of Exposure to Toxicants uses a rational, science-based approach to explain in plain language that a quantitative view is key for understanding and predicting potentially toxic effects of chemicals. 
     
     
     
    Key Features: 
     
     
     
    ● Explains the basics of toxicology in easily understandable terms. 
     
     
     
    ● Includes numerous examples. 
     
     
     
    ● Clears up common misconceptions and dispels myths. 
     
     
     
    ● Provides take-home messages for each chapter.
    Voir livre
  • Data-Intensive Applications - Mastering Data-Intensive Applications Design Scale and Optimization - cover

    Data-Intensive Applications -...

    James Ferry

    • 0
    • 0
    • 0
    In an era dominated by big data, mastering the art of building and maintaining data-intensive applications is crucial for any technology professional. "Mastering Data-Intensive Applications: Design, Scale, and Optimization" is a comprehensive guide that delves into the architectures, technologies, and practices essential for handling massive datasets efficiently and reliably. 
    This book begins by defining what makes an application data-intensive and explores the key challenges such as scalability, reliability, efficiency, and maintainability. Readers will learn about various storage options—from traditional relational databases to innovative NoSQL solutions—and understand when and how to use them effectively. The discussion extends to data distribution techniques, including partitioning and replication, essential for building fault-tolerant systems that can scale. 
    Further chapters focus on the nuts and bolts of data-intensive operations, including indexing, search, caching, batch and stream processing, and data integration. Each topic is covered with clear explanations, practical examples, and real-world case studies to demonstrate the application of these technologies in today’s leading companies. 
    Security and compliance are not overlooked; the book provides a thorough overview of the necessary practices to keep data secure and applications compliant with global regulations. Additionally, readers are equipped with strategies for scalability and performance tuning, helping them to improve existing systems and build efficient new systems from the ground up. 
    "Mastering Data-Intensive Applications" is an invaluable resource for software engineers, system architects, data scientists, and IT managers. Whether you are looking to deepen your existing knowledge or venturing into the field of data-intensive applications for the first time, this book offers the insights and tools needed to excel in this dynamic field. 
     
    Voir livre