The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:
Cloud
Networking
Identity management
Operational Technology (OT)
5G
Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.
Reihe
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Postgraduate and Professional Practice & Development
Illustrationen
31 farbige Abbildungen, 2 s/w Tabellen
2 Tables, black and white; 31 Illustrations, color
Maße
Höhe: 234 mm
Breite: 156 mm
Dicke: 8 mm
Gewicht
ISBN-13
978-87-7022-853-4 (9788770228534)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture - How and Why", published by River Publishers.
1. Why Zero-trust 2. How to Zero-trust 3. Zero-trust - The Network Level 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Zero-trust Governance/Compliance 8. OT Zero-trust Security 9. Next Steps