Zero trust journey across the digital estate:
"Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2023
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000646344/?ar |
Zusammenfassung: | "Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over the years, especially with the rise of SaaS and remote work. It has also become more practicable as technologies and tools built on its framework become mainstream. Zero Trust is rapidly becoming the security model of choice for many organizations; however, security leaders often struggle with the major shifts in strategy and architecture required to holistically implement Zero Trust. The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. Any organizations that embrace the key players' security products also require better guidance for reference and implementation"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 15, 2022) |
Umfang: | 1 Online-Ressource (xxiii, 212 Seiten) illustrations (some color) |
ISBN: | 9781003225096 1003225098 9781000646221 100064622X 9781000646344 1000646343 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102559961 | ||
003 | DE-627-1 | ||
005 | 20240429114541.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781003225096 |c electronic book |9 978-1-003-22509-6 | ||
020 | |a 1003225098 |c electronic book |9 1-003-22509-8 | ||
020 | |a 9781000646221 |c electronic book |9 978-1-000-64622-1 | ||
020 | |a 100064622X |c electronic book |9 1-000-64622-X | ||
020 | |a 9781000646344 |c electronic book |9 978-1-000-64634-4 | ||
020 | |a 1000646343 |c electronic book |9 1-000-64634-3 | ||
035 | |a (DE-627-1)102559961 | ||
035 | |a (DE-599)KEP102559961 | ||
035 | |a (ORHE)9781000646344 | ||
035 | |a (DE-627-1)102559961 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20220408 | |
100 | 1 | |a Kudrati, Abbas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Zero trust journey across the digital estate |c Abbas Kudrati and Binil Pillai |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2023 | |
264 | 4 | |c ©2023 | |
300 | |a 1 Online-Ressource (xxiii, 212 Seiten) |b illustrations (some color) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 15, 2022) | ||
520 | |a "Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over the years, especially with the rise of SaaS and remote work. It has also become more practicable as technologies and tools built on its framework become mainstream. Zero Trust is rapidly becoming the security model of choice for many organizations; however, security leaders often struggle with the major shifts in strategy and architecture required to holistically implement Zero Trust. The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. Any organizations that embrace the key players' security products also require better guidance for reference and implementation"-- | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Business information services |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Affaires ; Services d'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS / Cryptography | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Pillai, Binil |e VerfasserIn |4 aut | |
776 | 1 | |z 9781032125480 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032125480 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000646344/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102559961 |
---|---|
_version_ | 1821494933567045632 |
adam_text | |
any_adam_object | |
author | Kudrati, Abbas Pillai, Binil |
author_facet | Kudrati, Abbas Pillai, Binil |
author_role | aut aut |
author_sort | Kudrati, Abbas |
author_variant | a k ak b p bp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102559961 (DE-599)KEP102559961 (ORHE)9781000646344 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03849nam a22006372 4500</leader><controlfield tag="001">ZDB-30-ORH-102559961</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114541.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003225096</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-22509-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003225098</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-22509-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000646221</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-64622-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">100064622X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-64622-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000646344</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-64634-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000646343</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-64634-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102559961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102559961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000646344</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102559961</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220408</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kudrati, Abbas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero trust journey across the digital estate</subfield><subfield code="c">Abbas Kudrati and Binil Pillai</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 212 Seiten)</subfield><subfield code="b">illustrations (some color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 15, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over the years, especially with the rise of SaaS and remote work. It has also become more practicable as technologies and tools built on its framework become mainstream. Zero Trust is rapidly becoming the security model of choice for many organizations; however, security leaders often struggle with the major shifts in strategy and architecture required to holistically implement Zero Trust. The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. Any organizations that embrace the key players' security products also require better guidance for reference and implementation"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business information services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Affaires ; Services d'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pillai, Binil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032125480</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032125480</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000646344/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102559961 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:15Z |
institution | BVB |
isbn | 9781003225096 1003225098 9781000646221 100064622X 9781000646344 1000646343 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxiii, 212 Seiten) illustrations (some color) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | CRC Press |
record_format | marc |
spelling | Kudrati, Abbas VerfasserIn aut Zero trust journey across the digital estate Abbas Kudrati and Binil Pillai First edition. Boca Raton, FL CRC Press 2023 ©2023 1 Online-Ressource (xxiii, 212 Seiten) illustrations (some color) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 15, 2022) "Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over the years, especially with the rise of SaaS and remote work. It has also become more practicable as technologies and tools built on its framework become mainstream. Zero Trust is rapidly becoming the security model of choice for many organizations; however, security leaders often struggle with the major shifts in strategy and architecture required to holistically implement Zero Trust. The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. Any organizations that embrace the key players' security products also require better guidance for reference and implementation"-- Computer networks Security measures Business information services Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Affaires ; Services d'information ; Sécurité ; Mesures Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures Pillai, Binil VerfasserIn aut 9781032125480 Erscheint auch als Druck-Ausgabe 9781032125480 |
spellingShingle | Kudrati, Abbas Pillai, Binil Zero trust journey across the digital estate Computer networks Security measures Business information services Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Affaires ; Services d'information ; Sécurité ; Mesures Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
title | Zero trust journey across the digital estate |
title_auth | Zero trust journey across the digital estate |
title_exact_search | Zero trust journey across the digital estate |
title_full | Zero trust journey across the digital estate Abbas Kudrati and Binil Pillai |
title_fullStr | Zero trust journey across the digital estate Abbas Kudrati and Binil Pillai |
title_full_unstemmed | Zero trust journey across the digital estate Abbas Kudrati and Binil Pillai |
title_short | Zero trust journey across the digital estate |
title_sort | zero trust journey across the digital estate |
topic | Computer networks Security measures Business information services Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Affaires ; Services d'information ; Sécurité ; Mesures Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Business information services Security measures Computer security Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Affaires ; Services d'information ; Sécurité ; Mesures Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks ; Security measures |
work_keys_str_mv | AT kudratiabbas zerotrustjourneyacrossthedigitalestate AT pillaibinil zerotrustjourneyacrossthedigitalestate |