9781492096597-1492096598-Zero Trust Networks: Building Secure Systems in Untrusted Network

Zero Trust Networks: Building Secure Systems in Untrusted Network

ISBN-13: 9781492096597
ISBN-10: 1492096598
Edition: 2
Author: Evan Gilman, Doug Barth, Razi Rais, Christina Morillo
Publication date: 2024
Publisher: Oreilly & Associates Inc
Format: Paperback 312 pages
FREE US shipping on ALL non-marketplace orders
Marketplace
from $48.66 USD
Buy

From $48.66

Book details

ISBN-13: 9781492096597
ISBN-10: 1492096598
Edition: 2
Author: Evan Gilman, Doug Barth, Razi Rais, Christina Morillo
Publication date: 2024
Publisher: Oreilly & Associates Inc
Format: Paperback 312 pages

Summary

Zero Trust Networks: Building Secure Systems in Untrusted Network (ISBN-13: 9781492096597 and ISBN-10: 1492096598), written by authors Evan Gilman, Doug Barth, Razi Rais, Christina Morillo, was published by Oreilly & Associates Inc in 2024. With an overall rating of 3.6 stars, it's a notable title among other books. You can easily purchase or rent Zero Trust Networks: Building Secure Systems in Untrusted Network (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $20.44.

Description

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.

  • Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents
  • Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter
  • Migrate from a perimeter-based network to a zero trust network in production
  • Explore case studies that provide insights into organizations' zero trust journeys
  • Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book