Zero trust networks building secure systems in untrusted network

"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rais, Razi bin (VerfasserIn), Morillo, Christina (VerfasserIn), Gilman, Evan (VerfasserIn), Barth, Doug (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Rego Park, New York] Ascent Audio 2024
Ausgabe:2nd edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-104373539
003 DE-627-1
005 20240701091205.0
007 cr uuu---uuuuu
008 240701s2024 xx |||||o 00| ||eng c
020 |a 9781663735591  |9 978-1-6637-3559-1 
020 |a 166373559X  |9 1-6637-3559-X 
035 |a (DE-627-1)104373539 
035 |a (DE-599)KEP104373539 
035 |a (ORHE)9781663735591 
035 |a (DE-627-1)104373539 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240624 
100 1 |a Rais, Razi bin  |e VerfasserIn  |4 aut 
245 1 0 |a Zero trust networks  |b building secure systems in untrusted network  |c Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth 
250 |a 2nd edition. 
264 1 |a [Rego Park, New York]  |b Ascent Audio  |c 2024 
300 |a 1 online resource (1 audio file) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Machine-generated record 
520 |a "Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.". 
650 0 |a Computer networks  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Audiobooks 
650 4 |a Livres audio 
700 1 |a Morillo, Christina  |e VerfasserIn  |4 aut 
700 1 |a Gilman, Evan  |e VerfasserIn  |4 aut 
700 1 |a Barth, Doug  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781663735591/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-104373539
_version_ 1818767367099908096
adam_text
any_adam_object
author Rais, Razi bin
Morillo, Christina
Gilman, Evan
Barth, Doug
author_facet Rais, Razi bin
Morillo, Christina
Gilman, Evan
Barth, Doug
author_role aut
aut
aut
aut
author_sort Rais, Razi bin
author_variant r b r rb rbr
c m cm
e g eg
d b db
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)104373539
(DE-599)KEP104373539
(ORHE)9781663735591
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 2nd edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02834nam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-104373539</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091205.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663735591</subfield><subfield code="9">978-1-6637-3559-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">166373559X</subfield><subfield code="9">1-6637-3559-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104373539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104373539</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663735591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104373539</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240624</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rais, Razi bin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero trust networks</subfield><subfield code="b">building secure systems in untrusted network</subfield><subfield code="c">Razi Rais, Christina Morillo, Evan Gilman, &amp; Doug Barth</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Rego Park, New York]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Machine-generated record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.".</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Morillo, Christina</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gilman, Evan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barth, Doug</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663735591/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-104373539
illustrated Not Illustrated
indexdate 2024-12-18T08:48:45Z
institution BVB
isbn 9781663735591
166373559X
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 audio file)
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Ascent Audio
record_format marc
spelling Rais, Razi bin VerfasserIn aut
Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth
2nd edition.
[Rego Park, New York] Ascent Audio 2024
1 online resource (1 audio file)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Machine-generated record
"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ""trusted"" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.".
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Audiobooks
Livres audio
Morillo, Christina VerfasserIn aut
Gilman, Evan VerfasserIn aut
Barth, Doug VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781663735591/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Rais, Razi bin
Morillo, Christina
Gilman, Evan
Barth, Doug
Zero trust networks building secure systems in untrusted network
Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Audiobooks
Livres audio
title Zero trust networks building secure systems in untrusted network
title_auth Zero trust networks building secure systems in untrusted network
title_exact_search Zero trust networks building secure systems in untrusted network
title_full Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth
title_fullStr Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth
title_full_unstemmed Zero trust networks building secure systems in untrusted network Razi Rais, Christina Morillo, Evan Gilman, & Doug Barth
title_short Zero trust networks
title_sort zero trust networks building secure systems in untrusted network
title_sub building secure systems in untrusted network
topic Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Audiobooks
Livres audio
topic_facet Computer networks Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Audiobooks
Livres audio
url https://learning.oreilly.com/library/view/-/9781663735591/?ar
work_keys_str_mv AT raisrazibin zerotrustnetworksbuildingsecuresystemsinuntrustednetwork
AT morillochristina zerotrustnetworksbuildingsecuresystemsinuntrustednetwork
AT gilmanevan zerotrustnetworksbuildingsecuresystemsinuntrustednetwork
AT barthdoug zerotrustnetworksbuildingsecuresystemsinuntrustednetwork