Академический Документы
Профессиональный Документы
Культура Документы
Puthiyavan Udayakumar
Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity
Framework to Azure Services
Puthiyavan Udayakumar
Abu Dhabi, Abu Dhabi, United Arab Emirates
v
Table of Contents
vi
Table of Contents
vii
Table of Contents
viii
Table of Contents
ix
Table of Contents
x
Table of Contents
xi
Table of Contents
xii
Table of Contents
xiii
Table of Contents
xiv
Table of Contents
xv
Table of Contents
Index��������������������������������������������������������������������������������������������������������������������� 675
xvi
About the Author
Puthiyavan Udayakumar is an infrastructure architect with more than 15 years of
experience in modernizing and securing IT infrastructure, including in the cloud. He
has been writing technical books for more than 10 years on various infrastructure and
cybersecurity domains. He has designed, deployed, and secured IT infrastructure on
premises and in the cloud, including virtual servers, networks, storage, and desktops for
various industries (such as pharmaceutical, banking, healthcare, aviation, and federal
entities). He also earned the Master Certified Architect certification from Open Group.
xvii
About the Technical Reviewer
Kalyan Chanumolu is a senior technical program manager
at Microsoft. He works on building the engineering systems
that power the world’s computers. He has been a technical
reviewer for books on ASP.NET, Blazor, microservices, and
more, and is passionate about distributed systems and cloud
computing. He has vast experience in software development,
consulting, and migrating large customer workloads to the
cloud. He loves cycling, swimming, and reading books.
xix
Acknowledgments
Thanks to Smriti Srivastava for your invaluable support and guidance throughout the
publication process of this book. Your role as an acquisitions editor was instrumental in
bringing this book to fruition, and I am truly grateful for your expertise and dedication.
To Kalyan Chanumolu, I appreciate your time and effort in reviewing my work,
providing detailed feedback, and assisting with the necessary revisions. Your
professional approach, prompt communication, and attention to detail have made the
publishing journey smoother and more fulfilling.
Special thanks to Shonmirin P. A for your tireless efforts in publishing this book.
Thanks to all the Apress production team members.
xxi
Introduction
The rapid growth and adoption of cloud computing technologies have revolutionized
how organizations manage and deploy their information systems. However, with this
technological advancement comes an increased risk of cyber threats and security
breaches. Organizations need comprehensive frameworks and guidelines to address
these concerns and to establish robust cybersecurity practices. One such framework that
has gained significant traction in recent years is the National Institute of Standards and
Technology (NIST) Cybersecurity Framework (CSF).
In this book, we will explore the implementation of the NIST CSF within an Azure
cloud environment. This book provides a 360-degree view of the NIST CSF in line with
Microsoft Azure Services.
In alignment with industry best practices, the NIST CSF provides a structure for
organizations to assess and enhance their cybersecurity posture. This book shows
how to leverage Azure’s security features with the NIST CSF, enabling organizations to
strengthen their cloud security and protect their valuable assets. Specifically, the book’s
chapters cover the following:
• Introduction to cybersecurity
By the end of this chapter, you will have a clear understanding of the basic concepts of
cybersecurity, cloud computing, and Microsoft Azure’s security capabilities. You will also
gain familiarity with the NIST CSF and its functions. This foundation sets the stage for the
subsequent chapters, which map the Azure security controls to the framework and guide
you on implementing effective cybersecurity practices within the Azure environment.
xxiii
Introduction
Chapter 2: Design and Deploy Security for Infrastructure, Data, and Applications
Chapter 2 focuses on designing and deploying effective security strategies in Azure,
covering three key areas: securing infrastructure and platform components, securing
identify, and securing apps and data. Additionally, the chapter introduces the concept of
Microsoft SecOps, which integrates security and operations to enable proactive security
practices. The chapter provides key insights for the following:
• Governance (ID.GV)
xxiv
Introduction
risk assessment within Azure. This knowledge will lay the foundation for implementing
effective identify security strategies in subsequent chapters, strengthening the overall
security posture of Azure environments.
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into identify management, authentication, access
control, awareness and training within Azure.
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into ata security, within Azure. This knowledge will
enable readers to implement adequate security measures in Azure environments,
safeguarding data against security threats.
xxv
Introduction
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into information protection processes and procedures,
and protective technology within Azure. This knowledge will enable readers to
implement adequate security measures in Azure environments.
By the end of this chapter, readers will have a solid understanding of Azure’s
detect security services and their alignment with the NIST Cybersecurity Framework’s
Detect functions. They will gain insights into detecting anomalies, events, and security
incidents within Azure environments and the importance of continuous monitoring
and efficient detection processes. This knowledge will equip readers with the tools and
techniques to implement effective threat detection and incident response strategies in
Azure, enhancing the overall security posture of their environments.
• RS.AN: Analysis
• RS.MI: Mitigation
xxvi
Introduction
By the end of this chapter, readers will have a solid understanding of Azure’s respond
security services and their alignment with the NIST Cybersecurity Framework’s Respond
functions. They will gain insights into response planning, effective communications,
incident analysis, and mitigation strategies within Azure environments. This knowledge
will equip readers with the tools and techniques to develop robust incident response
capabilities in Azure, minimizing the impact of security incidents and facilitating a swift
and effective response.
• Azure Backup
By the end of this chapter, readers will have a solid understanding of NIST recovery
principles and how Azure’s recovery services align with these principles. They will gain
insights into Azure Recovery Services Mapping, Azure Backup, and Azure Site Recovery
and their role in facilitating efficient and reliable recovery in Azure environments. This
knowledge will enable readers to develop robust recovery strategies, implement appro-
priate backup mechanisms, and leverage Azure’s recovery services to minimize down-
time and ensure the resiliency of their systems and data.
xxvii
CHAPTER 1
• Introduction to cybersecurity
1
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_1
Chapter 1 Get Started with Azure Security
Introduction to Cybersecurity
In this section, we’ll get started by understanding what cybersecurity is.
In a nutshell, cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These attacks usually aim to access, change, or destroy
sensitive information, extort money from users, or interrupt normal business processes.
It is an essential part of any organization’s IT strategy. Cybersecurity is critical because
cybercriminals are constantly developing new methods to attack systems, networks, and
programs. Without proper security measures, organizations risk losing data, which can
be costly and can damage their reputation. It is, therefore, essential for organizations
to invest in cybersecurity to protect their data and systems. For example, organizations
should invest in cybersecurity for the following reasons:
2
Chapter 1 Get Started with Azure Security
3
Chapter 1 Get Started with Azure Security
• NASA cyberattack
• Adobe cyberattack
4
Chapter 1 Get Started with Azure Security
5
Chapter 1 Get Started with Azure Security
According to the Federal Information Processing Standards (FIPS), there are three
core security principles that guide the information security area: confidentiality,
integrity, and availability.
The three together make up the CIA triad, as shown in Figure 1-1.
Confidentiality
Cybersecurity
CIA Triad
Integrity Availability
The role of the cybersecurity architect is to ensure that the built systems or solutions
will meet the three principles.
7
Chapter 1 Get Started with Azure Security
Cyberattacks and their ramifications are everywhere these days. Global supply
chains are being attacked, resulting in significant economic consequences. It seems like
almost daily we hear about cybercriminals stealing the personal information of millions
of consumers from e-commerce sites. Government and health services are sometimes
blocked and extorted for ransom.
As cyberattacks evolve, they become more sophisticated. An organization or
institution can be targeted by cybercriminals from anywhere, including from inside an
organization.
Threat Landscape
Cyberattacks can exploit the entire digital landscape in which an organization
interacts, whether large or small. The following are key areas of the threat landscape:
email accounts, social media accounts, mobile devices, the organization’s technology
infrastructure, cloud services, and people.
Besides computers and mobile phones, threat landscapes can encompass any
element owned or managed by an organization and some that are not. Criminals use any
method to mount and carry out attacks, as you will learn next.
Threat modeling is an approach for analyzing the security of an application. In this
method, security risks are identified, quantified, and addressed in a structured manner.
It should be noted that a threat is not a vulnerability, as mentioned earlier. Threats can
exist even if there are no vulnerabilities.
Attack Vectors
Assailants access a system through an attack vector.
For example, cybercriminals can use email as a vector to attack users. These emails
may appear legitimate but ultimately result in a user downloading files or clicking links
that compromise their devices. Wireless networks are another common attack vector.
Bad actors in airports and coffee shops often exploit vulnerabilities in people’s devices
by accessing unsecured wireless networks. Another common way for cyberattacks to
take advantage of a system is by gaining access to unsecured Internet of Things (IoT)
devices.
8
Chapter 1 Get Started with Azure Security
However, it is essential to know that attackers do not have to use any of these. They
can use a variety of less obvious attack vectors. Figure 1-2 shows some key attack vectors.
Security Breaches
It is a security breach when someone gains unauthorized access to devices, services, or
networks. This is similar to an intruder (attacker) successfully breaking into a building (a
device, application, or network).
The following are forms of security breaches:
Data Breaches
Data breaches occur when an attacker successfully gets access to someone’s data.
This can lead to severe consequences for the victim, whether that is a person, an
organization, or even a government. This is because the victim’s data could be abused
in many ways. For example, it can be held as ransom or used to cause financial or
reputational harm.
11
Chapter 1 Get Started with Azure Security
Malware
Cybercriminals use malware to infect systems and carry out actions that cause harm,
such as stealing data or disrupting normal operations. A malware program consists of
two main components: the propagation mechanism and the payload.
Propagation is how the malware spreads itself across one or more systems. Here are
a few examples of standard propagation techniques:
• Virus: In biology, a virus enters the human body and can spread
once it has caused harm. We are already familiar with the term. A
technology-based virus enters a system through a means of entry,
a user action. For example, a user might download a file or plug in
a USB device that contains the virus, contaminating the system. A
security breach has occurred.
• Worm: Once a worm has infected the system, it can spread to other
computers connected to it, and it does not require any action from
the user to apply itself across systems like viruses do. Worms can
infect a device by exploiting a vulnerability in an application, and
they cause damage by finding vulnerable systems they can exploit. A
worm can spread to other devices on the same network or connected
networks once it has infected one.
• Trojan: Trojan horses are malware that mimics real software. They
got their name from soldiers hiding inside the wooden horse given
by the Trojans to soldiers. After installation, the program performs
malicious actions, including stealing information.
The payload is a malware action on an infected device or system. Here are some
common types of payloads:
• A ransomware payload locks down systems or data until a ransom
is paid. Cybercriminals can exploit an unknown vulnerability
in a network of connected devices to access all files across this
network and encrypt them. The attacker then demands a ransom
for decrypting the files. They may threaten to remove the files if the
ransom is not paid by a deadline.
12
Chapter 1 Get Started with Azure Security
13
Chapter 1 Get Started with Azure Security
Multifactor Authentication
Cybercriminals can access an account if a password or username is compromised, but
multifactor authentication prevents this.
It is common for users to provide more than one form of identification during
multifactor authentication. A password, which the user understands, is one of the most
common forms of identification.
A phone, hardware key, or another trusted device can also be used for
authentication, as can fingerprints or retinal scans (biometric authentication). The
purpose of multifactor authentication is to verify the identify of a user using two or more
of these forms of verification.
When accessing an online account, a bank might require users to enter security
codes received on their mobile device and their username and password.
Browser Security
As you have already seen, our Internet access can be compromised by attackers
compromising poorly secured browsers. By downloading malicious files or installing
malicious add-ons, users can compromise their browsers, devices, and even their
organizations’ systems by compromising them. Organizations can prevent attacks of this
type by implementing these security policies:
• Educate users.
Educating your staff about social engineering attacks can help organizations defend
themselves. Social engineering attacks aim to exploit human vulnerabilities to harm
individuals. Organizations can teach users how to recognize malicious content they
receive or encounter and act when they see something suspicious.
14
Chapter 1 Get Started with Azure Security
Threat Intelligence
It is not uncommon for cybercriminals to target organizations via a wide range of attack
vectors, and the threat landscape can be vast. As a result, organizations need to monitor,
prevent, defend against, and even identify potential vulnerabilities before cybercriminals
use them to conduct attacks.
Organizations can use threat intelligence to gather information about their systems,
vulnerabilities, and attacks. As a result of its understanding of this information, the
organization will be able to develop policies that protect against cyberattacks, including
those for security, devices, and user access. Threat intelligence collects information that
enables a company to gain insights into cyberattacks and respond accordingly.
Organizations can use technological solutions to implement threat intelligence
across their systems. These are often threat-intelligent solutions that automatically
collect information and even hunt and respond to attacks and vulnerabilities.
These are just some mitigation strategies organizations can take to protect against
cyberattacks. Mitigation strategies enable an organization to take a robust approach to
cybersecurity, ultimately preserving confidentiality, integrity, and availability.
Cryptography
Cryptography and encryption may conjure up visions of spies and covert operations
or hackers sitting in windowless rooms. Yet much of today’s modern online world is
possible only with these two techniques. In fact, cryptography and encryption are the
cornerstones of any good cybersecurity solution. For example, they help to keep your
emails safe from prying eyes and protect online payments. As you continue your journey
into cybersecurity, you’ll see how we use cryptography and encryption to protect
ourselves in day-to-day activities.
Information confidentiality, integrity, and availability are protected by cryptography,
which also protects against cyberattacks. Derived from the Greek word kryptos, which
means “hidden” or “secret,” cryptography is the application of secure communication
between a sender and a recipient. Cryptography is typically used to obscure a written
message’s meaning, but it can also be applied to images.
15
Chapter 1 Get Started with Azure Security
The first known use of cryptography can be traced back to ancient Egypt and the
use of complex hieroglyphics. One of the first ciphers ever used to secure military
communications came from the Roman emperor Julius Caesar.
These two examples make clear that cryptography has many uses and isn’t limited to
the digital world. However, from those humble origins, one thing is sure: cryptography is
now a fundamental requirement in helping secure our digitally connected planet.
• You can use cryptography to secure and protect external and internal
storage files.
As with all systems, cryptography has its own language; two important ones are
plaintext and ciphertext.
• When the plaintext has been turned into a secret message, it’s called
ciphertext. This term represents the encrypted/secured data.
16
Chapter 1 Get Started with Azure Security
As a rule, users should be given just enough permission to access the resources they
need once they have been authenticated. Authorization grants the user access to the
appropriate data and assets.
For example, when you go to the airport to board a flight, you must validate your
identify before receiving the boarding pass. You present yourself and your passport; if
they match, you are granted the boarding pass. Your boarding pass is your authorization,
allowing you to board the aircraft only for the booked flight.
17
Chapter 1 Get Started with Azure Security
• Insider threats
• Social engineering
18
Chapter 1 Get Started with Azure Security
• SQL injection attacks: Less mature websites accept user input without
validating or moderating it, exposing their networks to SQL injection
attacks.
19
Chapter 1 Get Started with Azure Security
Open-Source Vulnerabilities
The source code of open-source libraries is usually freely available, so anyone can access
it when they need to solve a specific problem. Developers will always check for open-
source solutions when solving a particular problem.
In addition to being publicly developed, open-source libraries can be used by
cybercriminals who try to exploit them. If a developer uses open-source libraries as part of
their application, they need to stay current on the latest versions to prevent cyberattacks.
Zero-Day Vulnerabilities
When cybercriminals find a zero-day vulnerability, they won’t publicize it but will take
full advantage of it. A cybercriminal conducts detailed reconnaissance of applications,
looking for vulnerabilities. By definition, the application owner was previously unaware
of zero-day vulnerabilities and has not patched them.
A cybercriminal might have noticed that a banking app has a zero-day vulnerability
and use this to steal money and information from application users. The zero days refers
to the number of days between discovering a vulnerability and releasing a fix.
Browser-Based Threats
In addition to serving as our gateway to the Internet, browsers play a key role in our daily
lives. The following are two more common browser-based threats to look out for.
Cookie-Based Attacks
You have probably heard about cookies, but do you actually know what they are?
Cookies are plaintext files containing small bits of data, such as your user credentials,
the last search you made, the last time you bought something, etc. By simplifying the
need to constantly log in to the site, cookies enhance your browser experience and make
browsing easier.
21
Another random document with
no related content on Scribd:
R
Raccoon story: a Menomini Indian folktale.
MP26061.
Raiders of the South.
R584641.
Raising performance expectations.
MP25690.
Ramic Productions.
MP25635.
Ramsgate Films.
MP25612.
Rand’s treachery.
R591432.
Rank, J. Arthur.
LF158.
Rank (J. Arthur) Film Distributors, Ltd.
LF179.
Rank (J. Arthur) Organisation.
LF166.
LF183.
LF185 - LF189.
LF192.
Rank Film Distributors, Ltd.
LF169.
LF173.
LF175.
LF177.
LF191.
LF193.
LF194.
LF196.
LF197.
LF198.
LF200.
LF208.
R580646.
R586092.
R586093.
R586094.
R590126.
R590127.
R590128.
R593268 - R593275.
Rankin and child, day of tournament.
MP25733.
Rank Organisation.
LF159 - LF163.
LF165.
LF174.
LF191.
LF194.
LF195.
Rank Organisation Film Productions, Ltd.
LF167 - LF175.
LF177.
LF195.
LF202 - LF207.
Rank Organisation. Special Features Division.
LF200.
Ransohoff (Martin) Productions,
LP43732.
Raskin, Ellen.
LP43692.
Rastar Pictures.
LP43931.
LP43942.
Rath Packing Company.
MP25577.
MP25578.
MP25579.
Ravi Shankar.
MP26014.
Ray Lum: mule trader.
MP25542.
Reachin’ for the lightning.
MP25851.
Reade (Walter) Organization, Inc.
LF161.
LF177.
LF202.
Readers Digest.
MP25658.
The Reader’s Digest Association, Inc.
LP43696.
Recognizing three-dimensional shapes.
LP43896 - LP43903.
Recognizing two-dimensional shapes.
LP43890 - LP43895.
Recommend.
MU9147.
Rectangles.
LP43895.
Rectangular solids.
LP43896.
Regions Beyond Missionary Union.
MP25750.
Remarks and conversations with Helen Frankenthaler.
MP25716.
Reno Associates.
LP43930.
Repin, Lev.
MU9028.
MU9029.
MU9030.
Repix, Inc.
R582725 - R582729.
R582731.
R582733 - R582741.
R590887 - R590897.
R592268.
Report on Greece.
MP25747.
R587470.
Republic Productions, Inc.
R582725 - R582741.
R586245.
R588538 - R588539.
R590888 - R590897.
R592268.
Requiem for a falling star.
LP43936.
Respect.
MP25795.
Revisited.
MU9039.
Rhinoceros.
LP43687.
RH—the disease and its conquest.
MP25710.
Rhythm, rhythm everywhere.
MP25701.
Richardson-Merrell, Inc. Jensen-Salsbery Laboratories Division.
MP25787.
Richler, Mordecai.
LP43739.
Riders of the Lone Star.
R585727.
Ride the pink horse.
R590970.
Riding the California trail.
R584640.
Riffraff.
R586034.
Right of way.
LP43945.
The Ripple effect.
MP25674.
RKO General, Inc.
R584159 - R584163.
R586033 - R586037.
RKO Radio Pictures, Inc.
R584159 - R584163.
R586033 - R586037.
Road to Hollywood.
R581367.
Robb, Lois Campbell.
MU9019.
Robbins (Marty) Enterprises.
LP43806.
LP43807.
Roberts, Bobby.
LP43679.
Roberts, Kenneth.
LP43639.
Robin Hood of Texas.
R582735.
Rohauer, Raymond.
LU3678.
MP25501.
MP25654.
R581367.
Romance and dance.
R587021.
Romance of the fjords.
R583816.
The Romans—life, laughter and laws.
LP43941.
Romanticism: revolt of the spirit.
LP43886.
Romino, D. J., 2nd
MU9158.
Rooney.
LF174.
Rooney (Pat) Productions.
LP43812.
Rosenkavalier.
LF171.
Ross, Lillian Bos.
LP43745.
Roth, Richard A.
LP43757.
Roundtable Productions, Inc.
LP43680.
LP43681.
Rowls/Woodcrafter.
MP25548.
Roy (Ross) Inc.
MP25676.
MP25677.
MP25678.
MP25800.
MP25915.
MP25916.
MP25917.
MP26048 - MP26055.
MP26068 - MP26077.
Royal ballet.
LF169.
Royal four flusher.
R587020.
Royal Opera House, Covent Garden, Ltd.
LF169.
Royalty of the range.
R583807.
Rubber River.
R590803.
Ruddy, Albert S.
LP43772.
Ruddy (Albert S.) Productions, Inc.
LP43772.
Running wild.
LP43729.
Rush to judgment.
MP25659.
The Russians nobody knows.
MP26039.
Rustlers of Devil’s Canyon.
R582738.
S
Sacks, Gilbert B.
MP25947.
Sacks (Gilbert) Enterprises.
MP25947.
Sacred dances of Tibet.
MU9168.
Saddle pals.
R582733.
Safari so good.
R592814.
Safety Department, Union Pacific Railroad. SEE Union Pacific
Railroad. Safety Department.
Safety for the new employee.
MP25728.
Saga and story in the Old Testament.
MP25896.
Saint Peter’s Lutheran Church of New York City
MP25956.
Saint Regis Paper Company.
MP25720.
Saint Vincent School, Santa Barbara, CA.
MU9071.
Salamanders and lizards.
LP43927.
Salt water tabby.
R581041.
Salvation Army.
MP25810.
San Andreas fault.
MP25892.
Sandilands (Ron) Inc.
LP43760.
Sandler Institutional Films, Inc.
LP43668 - LP43672.
Sandler International Films, Inc.
LP43668 - LP43672.
Saparoff Films, Inc. Dana Productions.
MP25689.
Saracen Films, Ltd.
LF201.
Sargassum weed community.
MP25873.
Sarge goes to college.
R594066.
Satisfied revised.
MP25785.
Sausage City.
MP25744.
Savage.
LP43804.
Sawmill.
MU9157.
Schaffer (Robert H.) and Associates.
MP25690 - MP25699.
Scheemann.
R583550.
Schiffner, Gregg G.
MU9157.
Schiffner, Linda D.
MU9157.
Schloat (Warren) Productions, Inc.
MP26034.
MP26059 - MP26062.
Schoenfeld Films Distributing Corporation.
LF171.
Schooling behavior of fishes.
MP25856.
The Schoolmarm.
LP43874.
Schwartz, Lillian.
LP43905 - LP43906.
Schwartz (Marvin) Productions, Inc.
LP43735.
Science Film Advisory Board, Iowa State University. SEE Iowa State
University, Ames. Science Film Advisory Board.
Science of glass packaging and handling.
MP25580.
Science of survival.
MP25820.
SCI teacher training program.
MP25713.
Sciuscia.
R587974.
The Screaming woman.
LP43716.
Screen Gems, Inc.
R582961.
R582963.
R582984.
R582972.
R591418.
R593905.
Screen Gems, Inc. Learning Company of America.
LP43884.
LP43885.
LP43887.
Screen News Digest.
MP25535 - MP25541.
Screen snapshots, ser. 26, no. 10.
R582973.
Sea Hound.
R591422 - R591423.
R591428 - R591434.
R593906 - R593909.
Seals and Crofts.
MP26012.
Seance on a wet afternoon.
LF165.
Search—encounters with science.
MP26010.
Search for fossil man.
MP2585O.
Season of fire.
MP25957.
Secondari (John) Productions, Ltd.
LP43941.
Second chance.
R583802.
Second honeymoon.
LP43972.
Secret life of Walter Mitty.
R586509.
R586510.
Secret of the skyroom.
R587224.
Secret sharer.
MP25897.
Secrets of success and how you can take advantage of inflation.
MP25575.
The Secret to success.
MP25992.
Secret witness.
LP43834.
Section of Orthopedic Surgery, School of Medicine, Yale University.
SEE Yale University. School of Medicine. Section of Orthopedic
Surgery.
Security surveys in manufacturing.
MP25995.
See ’n tell series.
MP25508.
See the man run.
LP43714.
Selling to women.
MP25800.
Sell price with strength.
MP26049.
Sennett, Mack.
R581367.
Series and parallel resonance.
MP25527.
Series of the greats.
MP25567 - MP25576.
Servant of the people.
MP25538.
Setting up an aquarium.
LP43925.
Seven days to a killing.
LP43770.
Seven forms of evidence.
MP25980.
Seven keys to baldpate.
R586035.
The Seventh mandarin.
LP43693.
Sex and the Evans family.
LP43976.
Sex role development.
MP26001.
Shachter, Jaqueline.
MP25827 - MP25848.
MP25923.
Shaffer, Anthony
LP43736.
The Shakers.
MP25738.
Shanks.
LP43796.
Shape up.
MP26064.
The Shattered mask.
LP43959.
Shaw, George Bernard.
MP25654.
The Sherwin-Williams Company.
MP25962.
Shirley.
LP43725.
Shoe-shine.
R587974.
Shorin ryu kata, goju-shiho.
MP25796.
Showcorporation.
LF169.
Shrimps of the coral reef.
MP25867.
Shuttle streaming in the slime mold Physarum polycephalum.