|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1131681056 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
191216s2019 nyua o 001 0 eng d |
040 |
|
|
|a GW5XE
|b eng
|e rda
|e pn
|c GW5XE
|d EBLCP
|d UPM
|d OCLCF
|d UKMGB
|d OCLCQ
|d AUD
|d N$T
|d SRU
|d UKAHL
|d YDX
|d OCLCQ
|d OCLCO
|d COM
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB9K3169
|2 bnb
|
016 |
7 |
|
|a 019637710
|2 Uk
|
019 |
|
|
|a 1130001824
|a 1134694247
|
020 |
|
|
|a 9781484254318
|q (electronic bk.)
|
020 |
|
|
|a 1484254317
|q (electronic bk.)
|
020 |
|
|
|z 9781484254301
|
024 |
7 |
|
|a 10.1007/978-1-4842-5431-8
|2 doi
|
029 |
1 |
|
|a AU@
|b 000066440499
|
029 |
1 |
|
|a AU@
|b 000066784624
|
029 |
1 |
|
|a AU@
|b 000070459374
|
029 |
1 |
|
|a UKMGB
|b 019637710
|
035 |
|
|
|a (OCoLC)1131681056
|z (OCoLC)1130001824
|z (OCoLC)1134694247
|
037 |
|
|
|a com.springer.onix.9781484254318
|b Springer Nature
|
050 |
|
4 |
|a TK5105.59
|b .K44 2019eb
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Keeriyattil, Sreejith,
|e author.
|
245 |
1 |
0 |
|a Zero trust networks with VMware NSX :
|b build highly secure network architectures for your data centers /
|c Sreejith Keeriyattil.
|
264 |
|
1 |
|a New York :
|b Apress,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed December 16, 2019).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Chapter 1: Network Defense Architecture -- Chapter 2: Microsegmentation and Zero Trust: Introduction -- Chapter 3: Zero Trust Networks with VMware NSX: Getting Started -- Chapter 4: NSX Service Composer and Third-Party Integration -- Chapter 5: Bird's-Eye View of a Zero Trust Network -- Chapter 6: NSX REST API and Power NSX -- Chapter 7: NSX Log Insight and Network Insight -- Chapter 8: VMware NSX/Airwatch and Conclusion.
|
520 |
|
|
|a Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center. Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture. You will: Know how micro-segmentation works and its benefits Implement VMware-distributed firewalls Automate security policies Integrate IPS/IDS with VMware NSX Analyze your firewall's configurations, rules, and policies.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a VMware.
|
630 |
0 |
7 |
|a VMware
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Keeriyattil, Sreejith.
|t Zero Trust Networks with VMware NSX : Build Highly Secure Network Architectures for Your Data Centers.
|d Berkeley, CA : Apress L.P., ©2019
|z 9781484254301
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484254318/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37100438
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5987647
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2321025
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16562053
|
994 |
|
|
|a 92
|b IZTAP
|