Cargando…

Zero trust networks : building secure systems in untrusted networks /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Gilman, Evan (Autor), Barth, Doug (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn992147642
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170628s2017 caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d OCLCF  |d ORE  |d N$T  |d EBLCP  |d IDEBK  |d YDX  |d TEFOD  |d COO  |d MNW  |d OCLCQ  |d CEF  |d KSU  |d VT2  |d WYU  |d C6I  |d UAB  |d AU@  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCQ  |d OCLCO 
019 |a 990777942  |a 991214979  |a 991285644  |a 1048185561  |a 1066461742  |a 1103260092  |a 1129369872 
020 |a 9781491962169 
020 |a 149196216X 
020 |a 9781491962145 
020 |a 1491962143 
020 |z 9781491962190 
020 |z 1491962194 
029 1 |a AU@  |b 000060837063 
029 1 |a GBVCP  |b 1004860625 
029 1 |a AU@  |b 000067115385 
035 |a (OCoLC)992147642  |z (OCoLC)990777942  |z (OCoLC)991214979  |z (OCoLC)991285644  |z (OCoLC)1048185561  |z (OCoLC)1066461742  |z (OCoLC)1103260092  |z (OCoLC)1129369872 
037 |a CL0500000870  |b Safari Books Online 
050 4 |a TK5105.59  |b .G55 2017eb 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Gilman, Evan,  |e author. 
245 1 0 |a Zero trust networks :  |b building secure systems in untrusted networks /  |c Evan Gilman and Doug Barth. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2017. 
300 |a 1 online resource (xiv, 223 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (viewed June 26, 2017). 
500 |a Includes index. 
505 0 |a Copyright; Table of Contents; Preface; Who Should Read This Book; Why We Wrote This Book; Zero Trust Networks Today; Navigating This Book; Conventions Used in This Book; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Zero Trust Fundamentals; What Is a Zero Trust Network?; Introducing the Zero Trust Control Plane; Evolution of the Perimeter Model; Managing the Global IP Address Space; Birth of Private IP Address Space; Private Networks Connect to Public Networks; Birth of NAT; The Contemporary Perimeter Model; Evolution of the Threat Landscape; Perimeter Shortcomings. 
505 8 |a Where the Trust LiesAutomation as an Enabler; Perimeter Versus Zero Trust; Applied in the Cloud; Summary; Chapter 2. Managing Trust; Threat Models; Common Threat Models; Zero Trust's Threat Model; Strong Authentication; Authenticating Trust; What Is a Certificate Authority?; Importance of PKI in Zero Trust; Private Versus Public PKI; Public PKI Strictly Better Than None; Least Privilege; Variable Trust; Control Plane Versus Data Plane; Summary; Chapter 3. Network Agents; What Is an Agent?; Agent Volatility; What's in an Agent?; How Is an Agent Used?; Not for Authentication. 
505 8 |a How to Expose an Agent?No Standard Exists; Rigidity and Fluidity, at the Same Time; Standardization Desirable; In the Meantime?; Summary; Chapter 4. Making Authorization Decisions; Authorization Architecture; Enforcement; Policy Engine; Policy Storage; What Makes Good Policy?; Who Defines Policy?; Trust Engine; What Entities Are Scored?; Exposing Scores Considered Risky; Data Stores; Summary; Chapter 5. Trusting Devices; Bootstrapping Trust; Generating and Securing Identity; Identity Security in Static and Dynamic Systems; Authenticating Devices with the Control Plane; X.509; TPMs. 
505 8 |a Hardware-Based Zero Trust Supplicant?Inventory Management; Knowing What to Expect; Secure Introduction; Renewing Device Trust; Local Measurement; Remote Measurement; Software Configuration Management; CM-Based Inventory; Secure Source of Truth; Using Device Data for User Authorization; Trust Signals; Time Since Image; Historical Access; Location; Network Communication Patterns; Summary; Chapter 6. Trusting Users; Identity Authority; Bootstrapping Identity in a Private System; Government-Issued Identification; Nothing Beats Meatspace; Expectations and Stars; Storing Identity; User Directories. 
505 8 |a Directory MaintenanceWhen to Authenticate Identity; Authenticating for Trust; Trust as the Authentication Driver; The Use of Multiple Channels; Caching Identity and Trust; How to Authenticate Identity; Something You Know: Passwords; Something You Have: TOTP; Something You Have: Certificates; Something You Have: Security Tokens; Something You Are: Biometrics; Out-of-Band Authentication; Single Sign On; Moving Toward a Local Auth Solution; Authenticating and Authorizing a Group; Shamir's Secret Sharing; Red October; See Something, Say Something; Trust Signals; Summary. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Barth, Doug,  |e author. 
776 0 8 |i Print version:  |a Evan Gilman; Doug Barth.  |t Zero Trust Networks.  |d O'Reilly Media, 2017-06-19 00:00:00.0  |z 9781491962190  |z 1491962194  |w (OCoLC)957747711 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491962183/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n zerotrustnetwork0000gilm 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32955229 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32906485 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4880716 
938 |a EBSCOhost  |b EBSC  |n 1538619 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis38394186 
938 |a YBP Library Services  |b YANK  |n 14643302 
994 |a 92  |b IZTAP