Fakta
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (Lydbog): 9781663735584
Release date
Lydbog: 4. juni 2024
Fakta
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
© 2024 Ascent Audio (Lydbog): 9781663735584
Release date
Lydbog: 4. juni 2024
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Ingen anmeldelser endnu
Download appen for at deltage i samtalen og tilføje anmeldelser.
Dansk
Danmark