|
![]() |
|||
|
||||
OverviewThe book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies: Cloud Networking Identity management Operational Technology (OT) 5G Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors. Full Product DetailsAuthor: Tom MadsenPublisher: River Publishers Imprint: River Publishers Weight: 0.100kg ISBN: 9788770228534ISBN 10: 8770228531 Pages: 122 Publication Date: 31 January 2024 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. Why Zero-trust 2. How to Zero-trust 3. Zero-trust - The Network Level 4. Zero-trust Identity 5. Cloud and Zero-trust 6. 5G and Zero-trust 7. Zero-trust Governance/Compliance 8. OT Zero-trust Security 9. Next StepsReviewsAuthor InformationTom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: ""The Art of War Fort Cyber Security"", published by Springer, and ""Security Architecture – How and Why"", published by River Publishers. Tab Content 6Author Website:Countries AvailableAll regions |