Zero-trust - An Introduction
The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

1144197936
Zero-trust - An Introduction
The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

61.99 In Stock
Zero-trust - An Introduction

Zero-trust - An Introduction

by Tom Madsen
Zero-trust - An Introduction

Zero-trust - An Introduction

by Tom Madsen

Paperback

$61.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G

Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.


Product Details

ISBN-13: 9788770228534
Publisher: River Publishers
Publication date: 01/31/2024
Series: River Publishers Rapids Series in Digital Security and Forensics
Pages: 134
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture – How and Why", published by River Publishers.

Table of Contents

1. Why Zero-trust 2. How to Zero-trust 3. Zero-trust - The Network Level 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Zero-trust Governance/Compliance 8. OT Zero-trust Security 9. Next Steps

From the B&N Reads Blog

Customer Reviews