|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1340404853 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
221013s2022 nju o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d YDX
|d ORMDA
|d OCLCF
|d TEFOD
|d N$T
|d UKMGB
|d OCLCO
|
015 |
|
|
|a GBC2E6660
|2 bnb
|
016 |
7 |
|
|a 020717240
|2 Uk
|
020 |
|
|
|a 9781119884859
|q electronic book
|
020 |
|
|
|a 1119884853
|q electronic book
|
020 |
|
|
|a 9781119884866
|q (electronic bk.)
|
020 |
|
|
|a 1119884861
|q (electronic bk.)
|
020 |
|
|
|z 1119884845
|
020 |
|
|
|z 9781119884842
|
029 |
1 |
|
|a AU@
|b 000072997768
|
029 |
1 |
|
|a UKMGB
|b 020717240
|
035 |
|
|
|a (OCoLC)1340404853
|
037 |
|
|
|a 9781119884842
|b O'Reilly Media
|
037 |
|
|
|a 6C352B64-844C-40B0-AB33-AD7A91E7D6A4
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HD61.5
|b .F56 2022
|
082 |
0 |
4 |
|a 658.47
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Finney, George,
|e author.
|
245 |
1 |
0 |
|a Project zero trust :
|b a story about a strategy for aligning security and the business /
|c George Finney.
|
264 |
|
1 |
|a Hoboken, NJ :
|b John Wiley & Sons, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource (xi, 196 pages.)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pp. 179-182) and index.
|
520 |
|
|
|a Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director. Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach. They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Entreprises
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a Business enterprises
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1119884845
|z 9781119884842
|w (OCoLC)1303561761
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119884842/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 18079234
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3355897
|
994 |
|
|
|a 92
|b IZTAP
|