Zero Trust Networks: Building Secure Systems in Untrusted Networks Contributor(s): Gilman, Evan (Author), Barth, Doug (Author) |
|||||||
ISBN: 1491962194 ISBN-13: 9781491962190 Publisher: O'Reilly Media
WE WILL NOT BE UNDERSOLD! Click here for our low price guarantee Binding Type: Paperback - See All Available Formats & Editions Published: July 2017 * Out of Print * |
Additional Information |
BISAC Categories: - Computers | Security - Networking - Computers | Networking - General |
Dewey: 005.82 |
LCCN: 2017471551 |
Physical Information: 0.51" H x 7" W x 9.19" L (0.86 lbs) 238 pages |
Features: Price on Product |
Descriptions, Reviews, Etc. |
Publisher Description: Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology.
|
Contributor Bio(s): Gilman, Evan: - Evan Gilman is an Operations Engineer with a background in computer networks. With roots in academia, and currently working in the public internet, he has been building and operating systems in hostile environments his entire professional career. An open source contributor, speaker, and author, Evan is passionate about designing systems that strike a balance with the networks they run on. Barth, Doug: -Doug Barth is a software engineer who loves to learn and shares his knowledge with others. He has worked on systems of various sizes at companies like Orbitz and PagerDuty. He has built and spoken about monitoring systems, mesh networks, and failure injection practices. |
Customer ReviewsSubmit your own review |
To tell a friend about this book, you must Sign In First! |