Zero trust networks : building secure systems in untrusted networks / Evan Gilman and Doug Barth.
Material type: TextPublication details: Sebastopol, CA : O'Reilly Media, c2017Edition: First editionDescription: xiv, 223 pages : illustrations ; 24 cmISBN: 9781491962190; 1491962194Subject(s): Computer security | Computer networks -- Security measures | Data encryption (Computer science) | Computer networks -- Security measures | Computer security | Data encryption (Computer science)LOC classification: QA76.9 .A25 | G55 2017
Contents:
Zero trust fundamentals -- Managing trust -- Network agents -- Making authorization decisions -- Trusting devices -- Trusting users -- Trusting applications -- Trusting the traffic -- Realizing zero trust network -- The adversarial view.
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | QA76.9 .A25 G55 2017 c.1 (Browse shelf (Opens below)) | 1 | Available | 00012981 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 F47 2003 c.4 Practical cryptography / | QA76.9.A25 F67 1997 c.1 Secure electronic commerce : | QA76.9.A25 .G54 2022 c.1 The ultimate Kali Linux book perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire / | QA76.9 .A25 G55 2017 c.1 Zero trust networks : building secure systems in untrusted networks / | QA76.9.A25 G64 2009 Vol. 1 c.1 Information Security Management : | QA76.9.A25 G64 2009 Vol.2 c.1 Information security management : | QA76.9.A25 G65 1999 c.1 Computer security / |
Includes index.
Zero trust fundamentals -- Managing trust -- Network agents -- Making authorization decisions -- Trusting devices -- Trusting users -- Trusting applications -- Trusting the traffic -- Realizing zero trust network -- The adversarial view.
There are no comments on this title.