Cargando…

What are the common challenges to adopting a zero trust network model? /

"Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1003227321
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 170908s2017 xx 007 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d OCLCF  |d UAB  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1003227321 
037 |a CL0500000890  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Barth, Doug,  |e on-screen presenter. 
245 1 0 |a What are the common challenges to adopting a zero trust network model? /  |c with Doug Barth and Evan Gilman. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2017] 
300 |a 1 online resource (1 streaming video file (6 min., 16 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenters, Doug Barth and Evan Gilman. 
500 |a Title from title screen (viewed September 7, 2017). 
500 |a Date of publication from resource description page. 
520 |a "Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges, and give suggestions on how to overcome them. You will get tips on why to involve more than just your security team, why implementing policy as code is important, understanding why you should evaluate policies for their impact and value, and the overall scale of change involved in moving from a perimeter model to a zero trust model."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Gilman, Evan,  |e on-screen presenter. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491998939/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP