James (Jong Hyuk) Park; Hsiao-Hwa Chen; Mohammed Atiquzzaman; Changhoon Lee; Sang-Soo Yeo Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2009) Pehmeäkantinen kirja
Cindy Green-Ortiz; Brandon Fowler; David Houck; Hank Hensel; Patrick Lloyd; Andrew McDonald; Jason Frazier Pearson Education (US) (2023) Pehmeäkantinen kirja
Bernd Kleinjohann (ed.); Lisa Kleinjohann (ed.); Ricardo J. Machado (ed.); Carlos Pereira (ed.); P.S. Thiagarajan (ed.) Springer (2006) Kovakantinen kirja
Kevin C. Chang; Wei Wang; Lei Chen; Clarence A. Ellis; Ching-Hsien Hsu; Ah Chung Tsoi; Haixun Wang; Xuemin Lin; Yu Yang Springer-Verlag Berlin and Heidelberg GmbH & Co. KG (2007) Pehmeäkantinen kirja
Bernd Kleinjohann (ed.); Lisa Kleinjohann (ed.); Ricardo J. Machado (ed.); Carlos Pereira (ed.); P.S. Thiagarajan (ed.) Springer (2010) Pehmeäkantinen kirja
Man Ho Allen Au; Arcangelo Castiglione; Kim-Kwang Raymond Choo; Francesco Palmieri; Kuan-Ching Li Springer International Publishing AG (2017) Pehmeäkantinen kirja
O'Reilly Media Sivumäärä: 300 sivua Asu: Pehmeäkantinen kirja Julkaisuvuosi: 2024, 08.03.2024 (lisätietoa) Kieli: Englanti
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.
Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter Migrate from a perimeter-based network to a zero trust network in production Explore case studies that provide insights into organizations' zero trust journeys Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others