Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Zero trust networks: building secure systems in untrusted networks
Bookmark Share

Print

Zero trust networks: building secure systems in untrusted networks

Gilman, Evan - Personal Name; Barth, Doug - Personal Name;

Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile.
Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You’ll learn the architecture of a zero trust network, including how to build one using currently available technology.

Table of contents
1. Zero Trust Fundamentals
2. Managing Trust
3. Network Agents
4. Making Authorization Decisions
5. Trusting Devices
6. Trusting Users
7. Trusting Applications
8. Trusting the Traffic
9. Realizing a Zero Trust Network
10. The Adversarial View
Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.82 GIL z
b0003003
Available
Detail Information
Series Title
--
Call Number
005.82 GIL z
Publisher
United States of America : O'Reilly Media., 2017
Collation
xiv, 223 hlm : illus ; 24 cm
Language
English
ISBN/ISSN
9781491962190
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
First edition
Subject(s)
Computer networks
Computer security
Data Encryption (Computer Science)
Specific Detail Info
--
Statement of Responsibility
Evan Gilman and Doug Barth
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?