Zero Trust Networks: Building Secure Systems in Untrusted Networks 1st Edition
Thumbnail 1

Zero Trust Networks: Building Secure Systems in Untrusted Networks 1st Edition

4.6/5
ID del producto: 49031522
Transacción segura

Descripción

Full description not available

Small manufacture image 1

Reseñas

4.6

Todo de compras verificadas

S**R

deFacto Reference Guide for Understanding and Building a Zero Trust Network

This book is perhaps the first complete commercial publication on this topic. It describes and characterizes the ZTN without prescribing a specific technology implementation. This book is a must-read for understanding the basis of an implementation and for balancing the claims of a vendor. At 216 pages it is packed with information; it might take a while to absorb fully the rich content. For me, it is best to absorb it in small chunks over an extended period of time.Of the 10 chapters, a particularly juicy one is chapter 8 "Trusting the Traffic" that explains networking fundamentals along with a detailed analysis of encryption; notably TLS and IPSEC. Chapter 6 "Trusting Users" conveys some heavy details of Identification and Authentication along with an emphasis on the need to create trusted hardware.For a person who participates in securing computer networks or has a desire to understand network security protocols in details, this book is a great read. For the fullest effect it is not a quick read but it has much to teach.

G**R

No Trust

This book really re-shaped my way of thinking about network security, breaking down concept by concept (with little focus on implementation details, which makes it more widely relevant to me) it goes through the main points to change the network architecture into a Beyond Corp (Google) like pattern. I learned a lot, and now I know what to go after as far as the actual implementation details, tools and frameworks for my company.

K**E

Helps with Unknown Unknowns.

The value of this book is in pointing out many "unknown unknowns". These are the things that are not accounted for that need to be taken into consideration. It does a good job of summarizing the overall process and goes into a fair amount of (PHB focused) detail on things like TPM, trust scores, and process.The main downside is that it talks mostly to an ideal environment or greenfield deployments. I was looking specifically for the boit-on tooling that can help with my environments. There's a general assumption that many of the policies and associated infrastructure can be readily added but this is not the typical case in my setups.All said, it's a well-written book and easy to comprehend. The pacing and level of detail is great for infrastructure architecture, but quite obviously cannot go into depth on any one topic.

N**N

Fantastic technical overview

I remember first hearing about Zero Trust and it sounded like a nebulous model that required a high-end firewall to sit at the center of it all, keeping an eye on traffic. This book rebukes that and give practical, common sense examples of how to create it. The authors even suggest a slow rollout...more proof of the practicality of this book.

S**N

A must read for anyone interested in ZTN

I read this book few months back. Its long overdue. I was at RSAC 2019 and bunch of vendors talk about ZTN. Before you start to buy / deploy any product in the name of ZTN, please read this book. This book does not talk about one specific product but rather describes all the integrations and risk . Its a must read for everyone at any level.

G**G

Great book on emerging information security implementation model

Zero Trust is emerging as the next model to adapt and secure the models of today's operating environment (e.g., Cloud and internal). This book provides a great overview of the topic. I think more work on diagrams if another version is done, but they are adequate for the discussion in current level of discussion.

C**Y

Very Through Overview if Zero Trust Networks

This book starts with defining what Zero Trust Networks are and uses very familiar terminology to help readers understand that they actually are attainable with the technology that you may already have in your data center albeit with changes to thought and practice which may sometimes be harder that the technical challenges. There was a huge focus on networks but I guess that is too be expected. I would love more information about the best software architectures for applications that must run within a Zero Trust Network. How does this network based shift in security affect well known design patterns?

R**S

Great foundation

Great intro to zero trust. It’s a must read for beginners and a refresher for Subject Matter Experts.

Preguntas comunes

Trustpilot

Trustscore 4.5 | Más de 7,300 reseñas

Por Vikram D.

La funda MOLLE es de una calidad excepcional. Estoy muy satisfecho con mi compra.

Hace 2 semanas

Por Neha S.

Excelente comunicación durante todo el proceso de pedido. El producto es perfecto.

Hace 2 semanas

Compre globalmente, ahorre con Desertcart
Valor por dinero
Precios competitivos en una amplia gama de productos.
Compre globalmente
Sirviendo a más de 300 millones de compradores en más de 200 países
Protección mejorada
Opciones de pago confiables que adoran los compradores de todo el mundo
Garantía del cliente
Opciones de pago confiables amadas por los compradores de todo el mundo.
Aplicación DesertCart
Compre sobre la marcha, en cualquier momento y en cualquier lugar.
S/.260

Derechos e impuestos incl.

Perualmacenar
1
Devoluciones gratuitas

30 diaspara usuarios de membresía PRO

15 diassin membresía

Transacción segura

Trustpilot

Trustscore 4.5 | Más de 7,300 reseñas

Meera L.

Transacción sin problemas y el producto llegó en perfectas condiciones.

Hace 3 semanas

Sneha T.

Recibí mi producto en perfectas condiciones. Excelente servicio en general.

Hace 1 mes

Zero Trust Networks Building Secure Systems In Untrusted Networks 1st | Desertcart Peru