|
|
|||
|
||||
OverviewThe modern digital landscape demands a radical shift from traditional perimeter defenses, making Zero Trust security the essential framework for survival. This book provides a practical, engineering-focused guide to this model, establishing that security is an organizational responsibility. The book systematically covers the Zero Trust Architecture and its six core pillars. You will learn to implement shift left security to protect your code and supply chain, and achieve network de-perimeterisation through effective segmentation. The book details protecting your most valuable asset, data, through encryption at rest and in transit, establishing continuous vulnerability management using tools (SCA, OSS), and maintaining operational integrity with SIEM-based continuous monitoring and incident response frameworks. Finally, it applies the framework to specialized contexts like container security and AI/ML models, concluding with strategies for managing complexity and ensuring compliance with global regulatory frameworks. By the end of this book, you will gain a deep, risk-based mastery of the entire Zero Trust lifecycle. You will be fully equipped to design, implement, and govern highly secure systems, confidently managing technical tradeoffs and transforming your organization's security posture to thrive against advanced threats. What you will learn ● Implement the Zero Trust model across all application development stages. ● Secure coding practices to fortify your software supply chain. ● Establish robust, modern identity and access management for all users. ● Adopt comprehensive data security policies protecting data at rest and in transit. ● Implement continuous monitoring and vulnerability management for proactive defense. ● Apply Zero Trust best practices to secure containers and AI technologies. ● Balance security goals with compliance and risk management frameworks effectively. Who this book is for This book is essential for developers (front-end, back-end, AI/ML), data engineers, infrastructure engineers, product leaders, and senior executives. Readers should have a basic understanding of software development, cloud operations, and organizational security challenges. Table of Contents 1. Understanding Zero Trust 2. Architecture and Pillars of Zero Trust 3. Secure Your Code, Build and Deploy 4. Secure Your Identities 5. Secure Your Network 6. Secure Your Data 7. Manage Vulnerabilities 8. Continuous Monitoring 9. Container Security 10. Security in the Age of Artificial Intelligence 11. Dealing with Complexity 12. Policies, Frameworks and Compliance Full Product DetailsAuthor: Mahesh PatilPublisher: Bpb Publications Imprint: Bpb Publications Dimensions: Width: 19.10cm , Height: 2.00cm , Length: 23.50cm Weight: 0.658kg ISBN: 9789365894370ISBN 10: 9365894379 Pages: 384 Publication Date: 25 December 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||