The zero trust framework and privileged access management (PAM):
"This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. This is primarily achieved through the use of Multifactor Factor (MFA) authentication, wh...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2024
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781040018705/?ar |
Zusammenfassung: | "This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. This is primarily achieved through the use of Multifactor Factor (MFA) authentication, where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is what is known as Privileged Access Management, also referred to as PAM. This is an area of Cybersecurity where protection of super user accounts, rights and privileges must be protected at all costs from the Cyberattacker. In this regard, this is where the Zero Trust Framework and PAM will intertwine together, especially in a Cloud based platform, like that of Microsoft Azure. But as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis not only for individuals, but for businesses as well. It is hoped that by combining the Zero Trust Framework along with PAM, the use of passwords can be eradicated all together, thus giving rise to the "Passwordless Society""-- |
Beschreibung: | Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Umfang: | 1 Online-Ressource |
ISBN: | 9781003470021 1003470025 9781040018705 104001870X 9781040018651 1040018653 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104368454 | ||
003 | DE-627-1 | ||
005 | 20240902105245.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781003470021 |c ebook |9 978-1-003-47002-1 | ||
020 | |a 1003470025 |9 1-003-47002-5 | ||
020 | |a 9781040018705 |c electronic bk. |9 978-1-040-01870-5 | ||
020 | |a 104001870X |c electronic bk. |9 1-040-01870-X | ||
020 | |a 9781040018651 |c electronic bk. : PDF |9 978-1-040-01865-1 | ||
020 | |a 1040018653 |c electronic bk. : PDF |9 1-040-01865-3 | ||
035 | |a (DE-627-1)104368454 | ||
035 | |a (DE-599)KEP104368454 | ||
035 | |a (ORHE)9781040018705 | ||
035 | |a (DE-627-1)104368454 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20240716 | |
100 | 1 | |a Das, Ravindra |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The zero trust framework and privileged access management (PAM) |c Ravindra Das |
250 | |a First edition. | ||
263 | |a 2405 | ||
264 | 1 | |a Boca Raton |b CRC Press |c 2024 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a "This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. This is primarily achieved through the use of Multifactor Factor (MFA) authentication, where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is what is known as Privileged Access Management, also referred to as PAM. This is an area of Cybersecurity where protection of super user accounts, rights and privileges must be protected at all costs from the Cyberattacker. In this regard, this is where the Zero Trust Framework and PAM will intertwine together, especially in a Cloud based platform, like that of Microsoft Azure. But as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis not only for individuals, but for businesses as well. It is hoped that by combining the Zero Trust Framework along with PAM, the use of passwords can be eradicated all together, thus giving rise to the "Passwordless Society""-- | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS / Cryptography | |
650 | 4 | |a COMPUTERS / Security / Viruses | |
650 | 4 | |a COMPUTERS / Security / General | |
776 | 1 | |z 9781032742571 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032742571 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781040018705/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104368454 |
---|---|
_version_ | 1821494931060948992 |
adam_text | |
any_adam_object | |
author | Das, Ravindra |
author_facet | Das, Ravindra |
author_role | aut |
author_sort | Das, Ravindra |
author_variant | r d rd |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104368454 (DE-599)KEP104368454 (ORHE)9781040018705 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03071cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-104368454</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240902105245.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003470021</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-003-47002-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003470025</subfield><subfield code="9">1-003-47002-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040018705</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-040-01870-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">104001870X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-040-01870-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040018651</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-040-01865-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1040018653</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-040-01865-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104368454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781040018705</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104368454</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240716</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Das, Ravindra</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The zero trust framework and privileged access management (PAM)</subfield><subfield code="c">Ravindra Das</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">2405</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. This is primarily achieved through the use of Multifactor Factor (MFA) authentication, where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is what is known as Privileged Access Management, also referred to as PAM. This is an area of Cybersecurity where protection of super user accounts, rights and privileges must be protected at all costs from the Cyberattacker. In this regard, this is where the Zero Trust Framework and PAM will intertwine together, especially in a Cloud based platform, like that of Microsoft Azure. But as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis not only for individuals, but for businesses as well. It is hoped that by combining the Zero Trust Framework along with PAM, the use of passwords can be eradicated all together, thus giving rise to the "Passwordless Society""--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032742571</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032742571</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781040018705/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104368454 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:13Z |
institution | BVB |
isbn | 9781003470021 1003470025 9781040018705 104001870X 9781040018651 1040018653 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Das, Ravindra VerfasserIn aut The zero trust framework and privileged access management (PAM) Ravindra Das First edition. 2405 Boca Raton CRC Press 2024 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed "This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses. This is primarily achieved through the use of Multifactor Factor (MFA) authentication, where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is what is known as Privileged Access Management, also referred to as PAM. This is an area of Cybersecurity where protection of super user accounts, rights and privileges must be protected at all costs from the Cyberattacker. In this regard, this is where the Zero Trust Framework and PAM will intertwine together, especially in a Cloud based platform, like that of Microsoft Azure. But as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis not only for individuals, but for businesses as well. It is hoped that by combining the Zero Trust Framework along with PAM, the use of passwords can be eradicated all together, thus giving rise to the "Passwordless Society""-- Computer security Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Security / Viruses COMPUTERS / Security / General 9781032742571 Erscheint auch als Druck-Ausgabe 9781032742571 |
spellingShingle | Das, Ravindra The zero trust framework and privileged access management (PAM) Computer security Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Security / Viruses COMPUTERS / Security / General |
title | The zero trust framework and privileged access management (PAM) |
title_auth | The zero trust framework and privileged access management (PAM) |
title_exact_search | The zero trust framework and privileged access management (PAM) |
title_full | The zero trust framework and privileged access management (PAM) Ravindra Das |
title_fullStr | The zero trust framework and privileged access management (PAM) Ravindra Das |
title_full_unstemmed | The zero trust framework and privileged access management (PAM) Ravindra Das |
title_short | The zero trust framework and privileged access management (PAM) |
title_sort | zero trust framework and privileged access management pam |
topic | Computer security Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Security / Viruses COMPUTERS / Security / General |
topic_facet | Computer security Sécurité informatique COMPUTERS / Cryptography COMPUTERS / Security / Viruses COMPUTERS / Security / General |
work_keys_str_mv | AT dasravindra thezerotrustframeworkandprivilegedaccessmanagementpam AT dasravindra zerotrustframeworkandprivilegedaccessmanagementpam |