Cargando…

Zero trust architecture /

Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all tha...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Green-Ortiz, Cindy (Autor), Fowler, Brandon (Autor), Houck, David (Autor), Hensel, Hank (Autor), Lloyd, Patrick (Autor), McDonald, Andrew (Autor), Frazier, Jason (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Jose, CA : Cysco Press, [2024]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000nam a22000007i 4500
001 OR_on1389906088
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 230711s2024 caua o 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |z 0137899734 
020 |z 9780137899739 
029 1 |a AU@  |b 000074930398 
035 |a (OCoLC)1389906088 
037 |a 9780137899722  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20230711 
049 |a UAMI 
100 1 |a Green-Ortiz, Cindy,  |e author. 
245 1 0 |a Zero trust architecture /  |c Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier. 
264 1 |a San Jose, CA :  |b Cysco Press,  |c [2024] 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust. 
588 |a Description based on print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Business information services  |x Security measures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Fowler, Brandon,  |e author. 
700 1 |a Houck, David,  |e author. 
700 1 |a Hensel, Hank,  |e author. 
700 1 |a Lloyd, Patrick,  |e author. 
700 1 |a McDonald, Andrew,  |e author. 
700 1 |a Frazier, Jason,  |e author. 
776 0 8 |i Print version:  |t ZERO TRUST ARCHITECTURE.  |d [Place of publication not identified] : CISCO PRESS, 2023  |z 0137899734  |w (OCoLC)1330196971 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780137899722/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP