Zero-trust - An Introduction

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

1144197936
Zero-trust - An Introduction

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

61.99 In Stock
Zero-trust - An Introduction

Zero-trust - An Introduction

by Tom Madsen
Zero-trust - An Introduction

Zero-trust - An Introduction

by Tom Madsen

eBook

$61.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.


Product Details

ISBN-13: 9781040007075
Publisher: River Publishers
Publication date: 01/31/2024
Series: River Publishers Rapids Series in Digital Security and Forensics
Sold by: Barnes & Noble
Format: eBook
Pages: 134
File size: 8 MB

About the Author

Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture – How and Why", published by River Publishers.

Table of Contents

1. Why Zero-trust 2. How to Zero-trust 3. Zero-trust - The Network Level 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Zero-trust Governance/Compliance 8. OT Zero-trust Security 9. Next Steps

From the B&N Reads Blog

Customer Reviews