
Zero Trust Networks (2nd Edition)
Building Secure Systems in Untrusted Networks
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $17.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Mike Chamberlain
Acerca de esta escucha
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile.
In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
You'll also explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agents; discover how this model embeds security within the system's operation, rather than layering it on top; use existing technology to establish trust among the actors in a network; migrate from a perimeter-based network to a zero trust network in production; examine case studies that provide insights into various organizations' zero trust journeys; and learn about the various zero trust architectures, standards, and frameworks.
©2024 Christina Morillo and Razi Rais (P)2024 Ascent AudioLos oyentes también disfrutaron...
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- De: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrado por: Teri Schnaubelt
- Duración: 12 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
De: William F. Reyor III, y otros
-
JavaScript (7th Edition)
- The Definitive Guide: Master the World's Most-Used Programming Language
- De: David Flanagan
- Narrado por: Gabriel Vaughan
- Duración: 25 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
This book is for programmers who want to learn JavaScript and for web developers who want to take their understanding and mastery to the next level. It begins by explaining the JavaScript language itself, in detail, from the bottom up. It then builds on that foundation to cover the web platform and Node.js.
De: David Flanagan
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- De: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrado por: Mike Lenz
- Duración: 8 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
De: Brian Allen, y otros
-
Learning DevSecOps
- A Practical Guide to Processes and Tools
- De: Steve Suehring
- Narrado por: Chris Sorensen
- Duración: 6 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while deploying new features? How do organizations increase security within their DevOps processes? This practical guide helps you answer those questions. Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps emphasizes prerequisites that lead to success through best practices and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations.
De: Steve Suehring
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- De: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrado por: Teri Schnaubelt
- Duración: 12 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
De: William F. Reyor III, y otros
-
JavaScript (7th Edition)
- The Definitive Guide: Master the World's Most-Used Programming Language
- De: David Flanagan
- Narrado por: Gabriel Vaughan
- Duración: 25 h y 27 m
- Versión completa
-
General
-
Narración:
-
Historia
This book is for programmers who want to learn JavaScript and for web developers who want to take their understanding and mastery to the next level. It begins by explaining the JavaScript language itself, in detail, from the bottom up. It then builds on that foundation to cover the web platform and Node.js.
De: David Flanagan
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- De: Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrado por: Mike Lenz
- Duración: 8 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
De: Brian Allen, y otros
-
Learning DevSecOps
- A Practical Guide to Processes and Tools
- De: Steve Suehring
- Narrado por: Chris Sorensen
- Duración: 6 h y 19 m
- Versión completa
-
General
-
Narración:
-
Historia
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while deploying new features? How do organizations increase security within their DevOps processes? This practical guide helps you answer those questions. Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps emphasizes prerequisites that lead to success through best practices and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations.
De: Steve Suehring
-
The Decision Intelligence Handbook
- Practical Steps for Evidence-Based Decisions in a Complex World
- De: L. Y. Pratt, N.E. Malcolm
- Narrado por: Daniel Henning
- Duración: 10 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Decision intelligence (DI) has been widely named as a top technology trend for several years, and Gartner reports that more than a third of large organizations are adopting it. Some even say that DI is the next step in the evolution of AI. Many software vendors offer DI solutions today, as they help organizations implement their evidence-based or data-driven decision strategies. But until now, there has been little practical guidance for organizations to formalize decision making and integrate their decisions with data. With this book, authors L. Y. Pratt and N. E. Malcolm fill this gap.
De: L. Y. Pratt, y otros
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
The DevSecOps Playbook
- Deliver Continuous Security at Speed
- De: Sean D. Mack
- Narrado por: William Sarris
- Duración: 7 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
In The DevSecOps Playbook: Deliver Continuous Security at Speed, the chief information and information security officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You'll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You'll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks.
-
-
Great overview!!!
- De BushSam en 11-12-24
De: Sean D. Mack
-
Introducing Python (2nd Edition)
- Modern Computing in Simple Packages
- De: Bill Lubanovic
- Narrado por: Derek Dysart
- Duración: 13 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Easy to understand and engaging, this updated edition of Introducing Python is ideal for beginning programmers as well as those new to the language. Author Bill Lubanovic takes you from the basics to more involved and varied topics, mixing tutorials with cookbook-style code recipes to explain concepts in Python 3. End-of-chapter exercises help you practice what you've learned.
-
-
Exactly what I wanted and expected.
- De ridgeway137 en 03-05-24
De: Bill Lubanovic
-
Fundamentals of Data Engineering
- Plan and Build Robust Data Systems
- De: Joe Reis, Matt Housley
- Narrado por: Adam Verner
- Duración: 17 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Data engineering has grown rapidly in the past decade, leaving many software engineers, data scientists, and analysts looking for a comprehensive view of this practice. With this practical book, you'll learn how to plan and build systems to serve the needs of your organization and customers by evaluating the best technologies available through the framework of the data engineering lifecycle.
-
-
Great for Hands on Business owners
- De LmL en 08-14-24
De: Joe Reis, y otros
-
Zero Trust Architecture
- Networking Technology: Security
- De: Cindy Green-Ortiz, Brandon Fowler, David Houck, y otros
- Narrado por: Alex Freeman
- Duración: 11 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
De: Cindy Green-Ortiz, y otros
-
CompTIA Security+ Study Guide with over 500 Practice Test Questions
- Exam SY0-701 (9th Edition)
- De: Mike Chapple, David Seidl
- Narrado por: Ray Greenley
- Duración: 24 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
In the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You'll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.
-
-
minor flaw but great content
- De A L en 03-04-25
De: Mike Chapple, y otros
-
Software Architecture: The Hard Parts
- Modern Trade-Off Analyses for Distributed Architectures
- De: Neal Ford, Mark Richards, Pramod Sadalage, y otros
- Narrado por: Dena Dahilig
- Duración: 12 h y 53 m
- Versión completa
-
General
-
Narración:
-
Historia
There are no easy decisions in software architecture. Instead, there are many hard parts—difficult problems or issues with no best practices—that force you to choose among various compromises. With this book, you'll learn how to think critically about the trade-offs involved with distributed architectures. Architecture veterans and practicing consultants Neal Ford, Mark Richards, Pramod Sadalage, and Zhamak Dehghani discuss strategies for choosing an appropriate architecture.
-
-
Great content. Terrible narration.
- De Alex en 12-16-23
De: Neal Ford, y otros
-
Security Chaos Engineering
- Sustaining Resilience in Software and Systems
- De: Kelly Shortridge, Aaron Rinehart - contributor
- Narrado por: April Doty
- Duración: 18 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals.
De: Kelly Shortridge, y otros
-
Modern Software Engineering
- Doing What Works to Build Better Software Faster
- De: David Farley
- Narrado por: Amy Gordon
- Duración: 9 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
In Modern Software Engineering, continuous delivery pioneer David Farley helps software professionals think about their work more effectively, manage it more successfully, and genuinely improve the quality of their applications, their lives, and the lives of their colleagues.
-
-
Could have been a 1-page bulleted list
- De Elle7se en 12-30-22
De: David Farley
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- De: Nicole Perlroth
- Narrado por: Allyson Ryan
- Duración: 18 h y 32 m
- Versión completa
-
General
-
Narración:
-
Historia
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- De since1968 en 02-13-21
De: Nicole Perlroth
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- De: Rick Howard
- Narrado por: Rick Howard
- Duración: 9 h y 15 m
- Versión completa
-
General
-
Narración:
-
Historia
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- De Roman en 11-17-24
De: Rick Howard
Las personas que vieron esto también vieron...
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- De: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrado por: Teri Schnaubelt
- Duración: 12 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
De: William F. Reyor III, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Zero Trust Architecture
- Networking Technology: Security
- De: Cindy Green-Ortiz, Brandon Fowler, David Houck, y otros
- Narrado por: Alex Freeman
- Duración: 11 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
De: Cindy Green-Ortiz, y otros
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
Defensive Security Handbook (2nd Edition)
- Best Practices for Securing Infrastructure
- De: William F. Reyor III, Lee Brotherston, Amanda Berlin
- Narrado por: Teri Schnaubelt
- Duración: 12 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
De: William F. Reyor III, y otros
-
Cybersecurity for Dummies
- De: Joseph Steinberg
- Narrado por: BJ Harrison
- Duración: 13 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity for Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
-
-
informative
- De Anonymous User en 07-09-21
De: Joseph Steinberg
-
Zero Trust Security Demystified
- Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
- De: L.D. Knowings
- Narrado por: KC Wayman
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
Gain cybersecurity confidence–unlock the secrets to a foolproof defense system for your digital assets. Did you know that a staggering 83% of businesses were hit by a cyber attack in 2022, and 60% of small companies never bounced back to their former glory within 6 months of the data breach? We live in a digital era where corporate secrets, critical data, and even our personal information, are always at the mercy of these invisible threats.
-
-
A Blueprint for Secure Networks
- De Madeline Mcgee en 03-16-24
De: L.D. Knowings
-
Zero Trust Architecture
- Networking Technology: Security
- De: Cindy Green-Ortiz, Brandon Fowler, David Houck, y otros
- Narrado por: Alex Freeman
- Duración: 11 h y 36 m
- Versión completa
-
General
-
Narración:
-
Historia
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.
De: Cindy Green-Ortiz, y otros
-
Zero Trust Security for Beginners
- A No-Fluff Guide to Implementing Zero Trust Architecture Using NIST
- De: Taimur Ijlal
- Narrado por: Craig Neutzling
- Duración: 1 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you will understand how to implement advanced cybersecurity strategies to protect your network from cyber threats. This audiobook covers everything you need to know about Zero Trust architecture, microsegmentation, network security, and NIST standard 800-207.
-
-
ZT
- De George en 04-14-24
De: Taimur Ijlal