Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition 275838

Паперова книга
275838
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition - фото 1
1'700
Купити

Все про “Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition”

Від видавця

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
  • Explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents
  • Understand how this model embeds security within the system's operation, rather than layering it on top
  • Use existing technology to establish trust among the actors in a network
  • Migrate from a perimeter-based network to a zero trust network in production
  • Examine case studies that provide insights into various organizations' zero trust journeys
  • Learn about the various zero trust architectures, standards, and frameworks
About the Author
Razi Rais is a cybersecurity leader with more than 20 years of expertise in building and running secure and resilient systems. He has been working with Microsoft for over a decade, holding positions such as software engineer, architect, and product manager. His current focus at Microsoft is on building cutting-edge cybersecurity products and services. Razi is also a lead author of several books, including Azure Confidential Computing and Zero Trust (O'Reilly), Microsoft Identity and Access Administrator (Microsoft Press), and Programming Microsoft's Clouds (Wrox Press). In addition to being an active member of the GIAC Advisory Board, he speaks frequently at international conferences like RSA and conducts workshops and training sessions on platforms such as O'Reilly and LinkedIn. You can contact him on LinkedIn (https://www.linkedin.com/in/razirais) or visit his website (https://razibinrais.com/).
Christina Morillo is an accomplished enterprise information security and technology leader with over two decades of practical experience building and leading comprehensive information security and technology programs. Her skill and expertise have landed her roles at organizations such as Microsoft and Morgan Stanley, and she currently leads information security for an NFL sports team. Christina's impact extends beyond her enterprise security work. She is a speaker and the author of 97 Things Every Information Security Professional Should Know and The Future of Security (both published by Oa??Reilly). Christina has also contributed to and been featured in a variety of industry publications. In addition, she serves as a Fellow and Advisor at New America for the #ShareTheMicInCyber Initiative, showcasing her commitment to the broader security community. For more on her professional journey and insights, visit https://bio.site/christinamorillo and https://www.christinamorillo.com.
Evan Gilman is the co-founder and CEO of SPIRL, the workload identity company. With roots in academia and a background in operations engineering and computer networks, he has been building and operating systems in hostile environments his entire professional career. An open source contributor, speaker, and author, Evan is passionate about designing systems that strike a balance with the networks they run on.
Doug Barth is a software engineer who loves to learn and shares his knowledge with others. In his over 20 years of professional experience, he has worked as both an infrastructure and product engineer at companies like SPIRL, Stripe, PagerDuty and Orbitz. He has built and spoken about monitoring systems, mesh networks, and failure injection practices.

Рецензії

0

Всі характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Номер видання
    2-ге вид.
  • Рік
    2024
  • Сторінок
    312
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
  • Безкоштовна доставка від 3'000,00 ₴
Вас може зацікавити
Лямбда-вирази в Java 8
14260
Ричард Уорбертон
380 ₴
Совершенный алгоритм. Комплект из 4 книг
236550
Тим Рафгарден
1'707 ₴1'760 ₴
Персонально для вас
Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques
281536
Muhiballah Mohammed
1'600 ₴
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures 4th ed. Edition
283679
Badr Nasslahsen
1'600 ₴
Supply Chain Software Security: AI, IoT, and Application Security First Edition
292940
Aamiruddin Syed
1'600 ₴
Security Engineering: A Guide to Building Dependable Distributed Systems
195459
Ross Anderson
1'700 ₴
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
267934
Stephanie DomasChristopher Domas
1'700 ₴
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice 1st Edition
273946
Benjamin Muschko
1'700 ₴
Docker: Up & Running; Shipping Reliable Containers in Production 3rd Edition
274003
Sean KaneKarl Matthias
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Web Application Security: Exploitation and Countermeasures for Modern Web Applications 2nd Edition
275577
Andrew Hoffman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴
PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
281518
Miriam C Wiesner
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
IT Security Controls. A Guide to Corporate Standards and Frameworks. 1st Ed.
244688
Virgilio Viegas, Oben Kuyucu
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
280690
James Forshaw
1'900 ₴
Black Hat Bash: Creative Scripting for Hackers and Pentesters
283851
Dolev FarhiNick Aleks
1'900 ₴
Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers
283885
Dominik Merli
1'900 ₴