Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Zero Trust Networks: Building Secure Systems in Untrusted Networks (2nd Edition)

Længde
12T 5M
Sprog
Engelsk
Format
Kategori

Fakta

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.

In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.

You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.

© 2024 Ascent Audio (Lydbog): 9781663735584

Release date

Lydbog: 4. juni 2024

Andre kan også lide...

  1. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  2. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  3. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  4. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  5. Cybersecutity First Principles Rick Howard
  6. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  7. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
  8. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  9. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  10. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  11. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  12. Cloud Security For Dummies Ted Coombs
  13. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  14. Cybersecurity For Dummies Joseph Steinberg
  15. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
  16. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  17. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  18. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Mike Chapple
  19. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  20. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  21. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  22. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
  23. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  24. Ransomware Protection Playbook Roger A. Grimes
  25. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  26. Cryptography: A Very Short Introduction Sean Murphy
  27. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  28. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
  29. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
  30. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
  31. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
  32. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  33. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  34. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  35. Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray A. Rothrock
  36. The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Disrupts Our World: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Alexis Wichowski
  37. Blockchain and the Law: The Rule of Code Aaron Wright
  38. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  39. The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet David Senecal
  40. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  41. Cybersecurity Unveiled: The Art of Cyber Defense: A Comprehensive Guide to Protecting Your Data Benjamin Chang
  42. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
  43. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  44. If It's Smart, It's Vulnerable Mikko Hypponen
  45. Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line John Sileo
  46. A Journey into Cybersecurity: Mastering Cybersecurity: Expert Insights and Best Practices Cameron Brooks
  47. Cyber Sentinel: Bulletproofing Your Digital Defenses: Protecting Your Online Presence from Cyber Threats Rachel Evans
  48. Learning DevSecOps: A Practical Guide to Processes and Tools Steve Suehring

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis