|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn992147642 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170628s2017 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d OCLCF
|d ORE
|d N$T
|d EBLCP
|d IDEBK
|d YDX
|d TEFOD
|d COO
|d MNW
|d OCLCQ
|d CEF
|d KSU
|d VT2
|d WYU
|d C6I
|d UAB
|d AU@
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 990777942
|a 991214979
|a 991285644
|a 1048185561
|a 1066461742
|a 1103260092
|a 1129369872
|
020 |
|
|
|a 9781491962169
|
020 |
|
|
|a 149196216X
|
020 |
|
|
|a 9781491962145
|
020 |
|
|
|a 1491962143
|
020 |
|
|
|z 9781491962190
|
020 |
|
|
|z 1491962194
|
029 |
1 |
|
|a AU@
|b 000060837063
|
029 |
1 |
|
|a GBVCP
|b 1004860625
|
029 |
1 |
|
|a AU@
|b 000067115385
|
035 |
|
|
|a (OCoLC)992147642
|z (OCoLC)990777942
|z (OCoLC)991214979
|z (OCoLC)991285644
|z (OCoLC)1048185561
|z (OCoLC)1066461742
|z (OCoLC)1103260092
|z (OCoLC)1129369872
|
037 |
|
|
|a CL0500000870
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .G55 2017eb
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gilman, Evan,
|e author.
|
245 |
1 |
0 |
|a Zero trust networks :
|b building secure systems in untrusted networks /
|c Evan Gilman and Doug Barth.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2017.
|
300 |
|
|
|a 1 online resource (xiv, 223 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (viewed June 26, 2017).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Copyright; Table of Contents; Preface; Who Should Read This Book; Why We Wrote This Book; Zero Trust Networks Today; Navigating This Book; Conventions Used in This Book; O'Reilly Safari; How to Contact Us; Acknowledgments; Chapter 1. Zero Trust Fundamentals; What Is a Zero Trust Network?; Introducing the Zero Trust Control Plane; Evolution of the Perimeter Model; Managing the Global IP Address Space; Birth of Private IP Address Space; Private Networks Connect to Public Networks; Birth of NAT; The Contemporary Perimeter Model; Evolution of the Threat Landscape; Perimeter Shortcomings.
|
505 |
8 |
|
|a Where the Trust LiesAutomation as an Enabler; Perimeter Versus Zero Trust; Applied in the Cloud; Summary; Chapter 2. Managing Trust; Threat Models; Common Threat Models; Zero Trust's Threat Model; Strong Authentication; Authenticating Trust; What Is a Certificate Authority?; Importance of PKI in Zero Trust; Private Versus Public PKI; Public PKI Strictly Better Than None; Least Privilege; Variable Trust; Control Plane Versus Data Plane; Summary; Chapter 3. Network Agents; What Is an Agent?; Agent Volatility; What's in an Agent?; How Is an Agent Used?; Not for Authentication.
|
505 |
8 |
|
|a How to Expose an Agent?No Standard Exists; Rigidity and Fluidity, at the Same Time; Standardization Desirable; In the Meantime?; Summary; Chapter 4. Making Authorization Decisions; Authorization Architecture; Enforcement; Policy Engine; Policy Storage; What Makes Good Policy?; Who Defines Policy?; Trust Engine; What Entities Are Scored?; Exposing Scores Considered Risky; Data Stores; Summary; Chapter 5. Trusting Devices; Bootstrapping Trust; Generating and Securing Identity; Identity Security in Static and Dynamic Systems; Authenticating Devices with the Control Plane; X.509; TPMs.
|
505 |
8 |
|
|a Hardware-Based Zero Trust Supplicant?Inventory Management; Knowing What to Expect; Secure Introduction; Renewing Device Trust; Local Measurement; Remote Measurement; Software Configuration Management; CM-Based Inventory; Secure Source of Truth; Using Device Data for User Authorization; Trust Signals; Time Since Image; Historical Access; Location; Network Communication Patterns; Summary; Chapter 6. Trusting Users; Identity Authority; Bootstrapping Identity in a Private System; Government-Issued Identification; Nothing Beats Meatspace; Expectations and Stars; Storing Identity; User Directories.
|
505 |
8 |
|
|a Directory MaintenanceWhen to Authenticate Identity; Authenticating for Trust; Trust as the Authentication Driver; The Use of Multiple Channels; Caching Identity and Trust; How to Authenticate Identity; Something You Know: Passwords; Something You Have: TOTP; Something You Have: Certificates; Something You Have: Security Tokens; Something You Are: Biometrics; Out-of-Band Authentication; Single Sign On; Moving Toward a Local Auth Solution; Authenticating and Authorizing a Group; Shamir's Secret Sharing; Red October; See Something, Say Something; Trust Signals; Summary.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Barth, Doug,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Evan Gilman; Doug Barth.
|t Zero Trust Networks.
|d O'Reilly Media, 2017-06-19 00:00:00.0
|z 9781491962190
|z 1491962194
|w (OCoLC)957747711
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491962183/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n zerotrustnetwork0000gilm
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32955229
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32906485
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4880716
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1538619
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis38394186
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14643302
|
994 |
|
|
|a 92
|b IZTAP
|