|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1395539206 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
230901s2024 nju o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|c YDX
|d OCLCO
|d YDX
|d ORMDA
|
020 |
|
|
|a 9781394203154
|q electronic book
|
020 |
|
|
|a 1394203152
|q electronic book
|
020 |
|
|
|a 9781394203185
|q electronic book
|
020 |
|
|
|a 1394203187
|q electronic book
|
020 |
|
|
|z 1394203144
|
020 |
|
|
|z 9781394203147
|
035 |
|
|
|a (OCoLC)1395539206
|
037 |
|
|
|a 9781394203147
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|b R37 2024
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20231009
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rasner, Gregory C.,
|e author.
|
245 |
1 |
0 |
|a Zero trust and third-party risk :
|b reduce the blast radius /
|c Gregory C. Rasner.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c [2024]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you'll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization--KC Enterprises--to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You'll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on October 09, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Risk management.
|
776 |
0 |
8 |
|c Original
|z 1394203144
|z 9781394203147
|w (OCoLC)1378701274
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781394203147/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 20465015
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 305674393
|
994 |
|
|
|a 92
|b IZTAP
|