|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1347750897 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221017s2022 xx 170 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|d OCLCF
|
019 |
|
|
|a 1362792202
|
024 |
8 |
|
|a 0636920817680
|
029 |
1 |
|
|a AU@
|b 000072848680
|
035 |
|
|
|a (OCoLC)1347750897
|z (OCoLC)1362792202
|
037 |
|
|
|a 0636920817680
|b O'Reilly Media
|
050 |
|
4 |
|a Q325.5
|
082 |
0 |
4 |
|a 006.31
|2 23/eng/20221017
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Security superstream :
|b zero trust /
|c Dr. Wendy Ng, Nicolas Chaillan, Wolfgang Goerlich, Razi Rais.
|
246 |
3 |
0 |
|a Zero trust
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (1 video file (2 hr., 50 min.)) :
|b sound, color.
|
306 |
|
|
|a 025000
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Chloé Messdaghi, Dr. Wendy Ng, Nicolas Chaillan, Wolfgang Goerlich, Razi Rais, presenters.
|
520 |
|
|
|a With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with key techniques and best practices for the zero-trust model and gain expert advice on emerging guidelines and standards and how to successfully deploy it. You'll learn how to employ multifactor authentication, biometric and behavioral analytics, and continuous monitoring to verify user identities and control access to sensitive resources as you explore the challenges and opportunities of adopting and integrating zero trust into your cybersecurity strategy. What you'll learn and how you can apply it Learn how to view your organization's security and IT infrastructure through the lens of zero trust Understand how zero trust will impact any existing identity, network, and security systems This recording of a live event is for you because... You're a security practitioner interested in implementing zero trust. You're a developer or engineer new to or looking to enter a security role. You want to become well-versed in the foundations and best practices of zero trust. Recommended follow-up: Read: Zero Trust Security: An Enterprise Guide (book) Watch: What Are the Common Challenges to Adopting a Zero Trust Network Security Model? (video).
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 17, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Messdaghi, Chloé,
|e presenter.
|
700 |
1 |
|
|a Ng, Wendy,
|e presenter.
|
700 |
1 |
|
|a Chaillan, Nicolas,
|e presenter.
|
700 |
1 |
|
|a Goerlich, Wolfgang,
|e presenter.
|
700 |
1 |
|
|a Rais, Razi bin,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920817680/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|