Zero trust networks - Razi Rais, Christina Morillo, Doug Barth

Zero trust networks

Building secure systems in untrusted network
Buch | Softcover
300 Seiten
2024 | 2., aktualisierte Auflage
O'Reilly Media (Verlag)
978-1-4920-9659-7 (ISBN)
65,95 inkl. MwSt
This practical book provides a detailed explanation of the zero trust security model. The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.

Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents
Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter
Migrate from a perimeter-based network to a zero trust network in production
Explore case studies that provide insights into organizations' zero trust journeys
Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others

Razi Rais has over two decades of experience designing and developing highly scalable and secure enterprise software and cloud services. He has been working at Microsoft for over ten years, serving in various roles such as software engineer, architect, and product manager. His current focus at Microsoft is on helping businesses strengthen their cybersecurity posture by protecting workloads at scale against the most sophisticated cyberattacks. Razi is also the lead author of several books, including Exam Ref SC-300: Microsoft Identity and Access Administrator by Microsoft Press and Programming Microsoft's Clouds: Windows Azure and Office 365 by Wrox Press. He is also a member of the IEEE Computer Society, ACM, SANS advisory board, as well as a frequent speaker at international conferences and an instructor who provides security-related training all over the world. You can get in touch with him via LinkedIn (https: //www.linkedin.com/in/razirais) or through his website, https: //razibinrais.com. His GitHub profile is https: //github.com/razi-rais. Christina Morillo is an information security and technology leader with an extensive background in enterprise security, identity, cloud and operations. In her current role as Principal Security Consultant, she leads the Microsoft Cloud Security Service offering focused on helping organizations improve their cloud identity and security posture. She is the author/editor of 97 Things Every Information Security Should Know, and The Future of Security report, published by O'Reilly Media. She also serves as Fellow and Advisor at New America for the #ShareTheMicInCyber Initiative. You can find her on the web at https: //bio.site/christinamorillo and at https: //www.christinamorillo.com Evan Gilman is an Operations Engineer with a background in computer networks. With roots in academia, and currently working in the public internet, he has been building and operating systems in hostile environments his entire professional career. An open source contributor, speaker, and author, Evan is passionate about designing systems that strike a balance with the networks they run on. Doug Barth is a software engineer who loves to learn and shares his knowledge with others. He has worked on systems of various sizes at companies like Orbitz and PagerDuty. He has built and spoken about monitoring systems, mesh networks, and failure injection practices.

Erscheinungsdatum
Reihe/Serie Animals
Zusatzinfo Illustrationen
Verlagsort Sebastopol
Sprache englisch
Maße 178 x 233 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-4920-9659-8 / 1492096598
ISBN-13 978-1-4920-9659-7 / 9781492096597
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00