Angebote zu "Security" (22 Treffer)

Kategorien

Shops

Microsoft Office 365 Cloud App Security - Abonn...
9,18 € *
ggf. zzgl. Versand

Kurzinfo: Microsoft Office 365 Cloud App Security - Abonnement-Lizenz - gehostet - Charity, Non-Profit - CSP Gruppe Anwendungen Hersteller Microsoft Hersteller Art. Nr. 6b87eec3-70cd-4e04-9262-0d12709d0f98 EAN/UPC Produktbeschreibung: Microsoft Office 365 Cloud App Security - Abonnement-Lizenz - 1 Lizenz Produkttyp Abonnement-Lizenz Kategorie Online- & Appliance-basierte Services - moderne Bedrohungsabwehr, Cloud-basierte Verwaltung Installationstyp Gehostet - SaaS Anzahl Lizenzen 1 Lizenz Lizenzpreise Charity, Non-Profit Lizenzprogramm Microsoft Cloud Solution Provider (CSP) Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - moderne Bedrohungsabwehr, Cloud-basierte Verwaltung Produkttyp Abonnement-Lizenz Installationstyp Gehostet - SaaS Lizenzierung Lizenztyp 1 Lizenz Lizenzpreise Charity, Non-Profit Lizenzprogramm Microsoft Cloud Solution Provider (CSP)

Anbieter: JACOB Computer
Stand: 25.09.2020
Zum Angebot
Mastering Identity and Access Management with M...
40,46 € *
ggf. zzgl. Versand

Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environmentsAbout This BookDeep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solutionDesign, implement and manage simple and complex hybrid identity and access management environmentsLearn to apply solution architectures directly to your business needs and understand how to identify and manage business drivers during transitionsWho This Book Is ForThis book is for business decision makers, IT consultants, and system and security engineers who wish to plan, design, and implement Identity and Access Management solutions with Microsoft Azure.What You Will LearnApply technical descriptions and solution architectures directly to your business needs and deploymentsIdentify and manage business drivers and architecture changes to transition between different scenariosUnderstand and configure all relevant Identity and Access Management key features and conceptsImplement simple and complex directory integration, authentication, and authorization scenariosGet to know about modern identity management, authentication, and authorization protocols and standardsImplement and configure a modern information protection solutionIntegrate and configure future improvements in authentication and authorization functionality of Windows 10 and Windows Server 2016In DetailMicrosoft Azure and its Identity and Access Management is at the heart of Microsoft's Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery.Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality.Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality.Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.Style and approachA practical, project-based learning experience explained through hands-on examples.

Anbieter: buecher
Stand: 25.09.2020
Zum Angebot
Mastering Identity and Access Management with M...
40,46 € *
ggf. zzgl. Versand

Start empowering users and protecting corporate data, while managing Identities and Access with Microsoft Azure in different environmentsAbout This BookDeep dive into the Microsoft Identity and Access Management as a Service (IDaaS) solutionDesign, implement and manage simple and complex hybrid identity and access management environmentsLearn to apply solution architectures directly to your business needs and understand how to identify and manage business drivers during transitionsWho This Book Is ForThis book is for business decision makers, IT consultants, and system and security engineers who wish to plan, design, and implement Identity and Access Management solutions with Microsoft Azure.What You Will LearnApply technical descriptions and solution architectures directly to your business needs and deploymentsIdentify and manage business drivers and architecture changes to transition between different scenariosUnderstand and configure all relevant Identity and Access Management key features and conceptsImplement simple and complex directory integration, authentication, and authorization scenariosGet to know about modern identity management, authentication, and authorization protocols and standardsImplement and configure a modern information protection solutionIntegrate and configure future improvements in authentication and authorization functionality of Windows 10 and Windows Server 2016In DetailMicrosoft Azure and its Identity and Access Management is at the heart of Microsoft's Software as a Service, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is an essential tool to master in order to effectively work with the Microsoft Cloud. Through practical, project based learning this book will impart that mastery.Beginning with the basics of features and licenses, this book quickly moves on to the user and group lifecycle required to design roles and administrative units for role-based access control (RBAC). Learn to design Azure AD to be an identity provider and provide flexible and secure access to SaaS applications. Get to grips with how to configure and manage users, groups, roles, and administrative units to provide a user- and group-based application and self-service access including the audit functionality.Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. Construct blueprints with different authentication scenarios including multi-factor authentication. Discover how to configure and manage the identity synchronization and federation environment along with multi -factor authentication, conditional access, and information protection scenarios to apply the required security functionality.Finally, get recommendations for planning and implementing a future-oriented and sustainable identity and access management strategy.Style and approachA practical, project-based learning experience explained through hands-on examples.

Anbieter: buecher
Stand: 25.09.2020
Zum Angebot
Infrastructural Security for Virtualized Grid C...
89,90 € *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Dodax
Stand: 25.09.2020
Zum Angebot
Fine-Grained Authorization Services in Virtual ...
59,00 € *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions interest in developing research projects that involve more than one insti tution s computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user s virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Dodax
Stand: 25.09.2020
Zum Angebot
Authentication in Insecure Environments
79,99 € *
ggf. zzgl. Versand

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.

Anbieter: Dodax
Stand: 25.09.2020
Zum Angebot
Intel Trusted Execution Technology for Server P...
37,44 € *
ggf. zzgl. Versand

"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!"John McAuley,EMC Corporation"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."Alex Rodriguez, Expedient Data Centers"This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."Pete Nicoletti. Virtustream Inc.Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.With a foreword from Albert Caballero, the CTO at Trapezoid.

Anbieter: Dodax
Stand: 25.09.2020
Zum Angebot
Infrastructural Security for Virtualized Grid C...
146,00 CHF *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Orell Fuessli CH
Stand: 25.09.2020
Zum Angebot
Fine-Grained Authorization Services in Virtual ...
96,90 CHF *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions' interest in developing research projects that involve more than one insti tution's computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user's virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Orell Fuessli CH
Stand: 25.09.2020
Zum Angebot