Zero trust networks building secure systems in untrusted network
"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you t...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Rego Park, New York]
Ascent Audio
2024
|
Ausgabe: | 2nd edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104373539 | ||
003 | DE-627-1 | ||
005 | 20240701091205.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781663735591 |9 978-1-6637-3559-1 | ||
020 | |a 166373559X |9 1-6637-3559-X | ||
035 | |a (DE-627-1)104373539 | ||
035 | |a (DE-599)KEP104373539 | ||
035 | |a (ORHE)9781663735591 | ||
035 | |a (DE-627-1)104373539 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240624 | |
100 | 1 | |a Rais, Razi bin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Zero trust networks |b building secure systems in untrusted network |c Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth |
250 | |a 2nd edition. | ||
264 | 1 | |a [Rego Park, New York] |b Ascent Audio |c 2024 | |
300 | |a 1 online resource (1 audio file) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Machine-generated record | ||
520 | |a "Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.". | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Morillo, Christina |e VerfasserIn |4 aut | |
700 | 1 | |a Gilman, Evan |e VerfasserIn |4 aut | |
700 | 1 | |a Barth, Doug |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663735591/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104373539 |
---|---|
_version_ | 1818767367099908096 |
adam_text | |
any_adam_object | |
author | Rais, Razi bin Morillo, Christina Gilman, Evan Barth, Doug |
author_facet | Rais, Razi bin Morillo, Christina Gilman, Evan Barth, Doug |
author_role | aut aut aut aut |
author_sort | Rais, Razi bin |
author_variant | r b r rb rbr c m cm e g eg d b db |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104373539 (DE-599)KEP104373539 (ORHE)9781663735591 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02834nam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-104373539</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091205.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663735591</subfield><subfield code="9">978-1-6637-3559-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">166373559X</subfield><subfield code="9">1-6637-3559-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104373539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104373539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663735591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104373539</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240624</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rais, Razi bin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero trust networks</subfield><subfield code="b">building secure systems in untrusted network</subfield><subfield code="c">Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Rego Park, New York]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Machine-generated record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.".</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morillo, Christina</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gilman, Evan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barth, Doug</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663735591/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104373539 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:45Z |
institution | BVB |
isbn | 9781663735591 166373559X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 audio file) |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Ascent Audio |
record_format | marc |
spelling | Rais, Razi bin VerfasserIn aut Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth 2nd edition. [Rego Park, New York] Ascent Audio 2024 1 online resource (1 audio file) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Machine-generated record "Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.". Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Audiobooks Livres audio Morillo, Christina VerfasserIn aut Gilman, Evan VerfasserIn aut Barth, Doug VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781663735591/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Rais, Razi bin Morillo, Christina Gilman, Evan Barth, Doug Zero trust networks building secure systems in untrusted network Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Audiobooks Livres audio |
title | Zero trust networks building secure systems in untrusted network |
title_auth | Zero trust networks building secure systems in untrusted network |
title_exact_search | Zero trust networks building secure systems in untrusted network |
title_full | Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth |
title_fullStr | Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth |
title_full_unstemmed | Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth |
title_short | Zero trust networks |
title_sort | zero trust networks building secure systems in untrusted network |
title_sub | building secure systems in untrusted network |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Audiobooks Livres audio |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Audiobooks Livres audio |
url | https://learning.oreilly.com/library/view/-/9781663735591/?ar |
work_keys_str_mv | AT raisrazibin zerotrustnetworksbuildingsecuresystemsinuntrustednetwork AT morillochristina zerotrustnetworksbuildingsecuresystemsinuntrustednetwork AT gilmanevan zerotrustnetworksbuildingsecuresystemsinuntrustednetwork AT barthdoug zerotrustnetworksbuildingsecuresystemsinuntrustednetwork |