Zero Trust Architecture: Networking Technology: Securit
Autor Cindy Green-Ortiz, Andrew Mcdonald, David Houck, Patrick Lloyd, Brandon Fowler, Hank Hensel, Jason Frazieren Limba Engleză Paperback – 12 iul 2023
A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model.
Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust.
Preț: 310.64 lei
Preț vechi: 388.30 lei
-20% Nou
Puncte Express: 466
Preț estimativ în valută:
59.48€ • 64.34$ • 49.57£
59.48€ • 64.34$ • 49.57£
Carte disponibilă
Livrare economică 16-22 noiembrie
Livrare express 05-09 noiembrie pentru 37.63 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780137899739
ISBN-10: 0137899734
Pagini: 336
Dimensiuni: 186 x 226 x 20 mm
Greutate: 0.61 kg
Editura: Cisco Systems
Colecția Networking Technology: Securit
Seria Networking Technology: Securit
ISBN-10: 0137899734
Pagini: 336
Dimensiuni: 186 x 226 x 20 mm
Greutate: 0.61 kg
Editura: Cisco Systems
Colecția Networking Technology: Securit
Seria Networking Technology: Securit
Cuprins
ForewordIntroductionPart I: Concepts1. Overview of Zero Trust (ZT): It's a Journey2. Cisco Zero Trust: Security Capability Requirements3. Zero Trust Reference Architecture and Enclave Design4. Security Capability Use Cases5. SegmentationPart II: Implementation6. Segmentation Methods: Pros and Cons7. Segmentation Foundational Functions and Applications (CMDB, App Inv, VLAN, Host Naming)8. Map Functions to Segments / Implement Solutions9. Test and Monitor ZT Segmentation and Solutions (LLD / SVS) - PhasedConclusion (Journey)AfterwordBibliographyAcknowledgements