Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Architecting Microsoft Azure Solutions ??? Exam Guide 70-535

You're reading from   Architecting Microsoft Azure Solutions ??? Exam Guide 70-535 A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Arrow left icon
Product type Paperback
Published in Apr 2018
Publisher Packt
ISBN-13 9781788991735
Length 418 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Sjoukje Zaal Sjoukje Zaal
Author Profile Icon Sjoukje Zaal
Sjoukje Zaal
Sjoukje Zaal Sjoukje Zaal
Author Profile Icon Sjoukje Zaal
Sjoukje Zaal
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Working with Azure Virtual Machines FREE CHAPTER 2. Configuring Compute-Intensive Applications 3. Designing Web Applications 4. Implementing Serverless and Microservices 5. Robust Networking Implementations 6. Connecting Hybrid Applications 7. Using Storage Solutions 8. Scalable Data Implementations 9. Securing Your Resources 10. Securing Your Data 11. Governance and Policies 12. Artificial Intelligence, IoT, and Media Services 13. Implementing Messaging Solutions 14. Application Monitoring and Alerting Strategies 15. Exploring Operations Automation Strategies 16. Other Books You May Enjoy Appendix A – Assessments
1. Appendix B – Mock Test Questions
2. Appendix C – Mock Test Answers

Network security strategies

With all the hacking incidents nowadays, a strong network security strategy is key. It is not secure to just create a public IP address and expose your Azure resource to the internet. This will make you vulnerable for attacks. Design your networks with security in mind and reduce what is exposed to the internet. You can use the features that Azure provides for securing your networks. Azure offers support for different security strategies, which are described in the following section.

DMZ

A demilitarized zone (DMZ) or perimeter network is a physical or logical boundary between the internal and the external network of an organization. The external network can be the internet. The purpose is to add...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image