Evan Gilman is an Operations Engineer with a background in computer networks. With roots in academia, and currently working in the public internet, he has been building and operating systems in hostile environments his entire professional career. An open source contributor, speaker, and author, Evan is passionate about designing systems that strike a balance with the networks they run on.
Doug Barth is a software engineer who loves to learn and shares his knowledge with others. He has worked on systems of various sizes at companies like Orbitz and PagerDuty. He has built and spoken about monitoring systems, mesh networks, and failure injection practices.
Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile.
Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You’ll learn the architecture of a zero trust network, including how to build one using currently available technology.
Understand how the zero trust model embeds security within the system’s operation, rather than layering it on top
Examine the fundamental concepts at play in a zero trust network, including network agents and trust engines
Use existing technology to establish trust among the actors in a network
Learn how to migrate from a perimeter-based network to a zero trust network in production
Explore case studies of zero trust on the client side (Google) and on the server (PagerDuty)
發表於2024-12-23
Zero Trust Networks 2024 pdf epub mobi 電子書 下載
第一次聽說零信任網絡的係統性應用方案,是在2018年的一場騰訊安全會議上,提到騰訊基於google beyond comp論文的實踐,最早的概念起源於安全領域的預測機構之一forrester的首席分析師johnkindervag在2010年提齣,由於google的親賴在2013年應用而變得備受追捧。 在安全領域有些...
評分第一次聽說零信任網絡的係統性應用方案,是在2018年的一場騰訊安全會議上,提到騰訊基於google beyond comp論文的實踐,最早的概念起源於安全領域的預測機構之一forrester的首席分析師johnkindervag在2010年提齣,由於google的親賴在2013年應用而變得備受追捧。 在安全領域有些...
評分第一次聽說零信任網絡的係統性應用方案,是在2018年的一場騰訊安全會議上,提到騰訊基於google beyond comp論文的實踐,最早的概念起源於安全領域的預測機構之一forrester的首席分析師johnkindervag在2010年提齣,由於google的親賴在2013年應用而變得備受追捧。 在安全領域有些...
評分第一次聽說零信任網絡的係統性應用方案,是在2018年的一場騰訊安全會議上,提到騰訊基於google beyond comp論文的實踐,最早的概念起源於安全領域的預測機構之一forrester的首席分析師johnkindervag在2010年提齣,由於google的親賴在2013年應用而變得備受追捧。 在安全領域有些...
評分第一次聽說零信任網絡的係統性應用方案,是在2018年的一場騰訊安全會議上,提到騰訊基於google beyond comp論文的實踐,最早的概念起源於安全領域的預測機構之一forrester的首席分析師johnkindervag在2010年提齣,由於google的親賴在2013年應用而變得備受追捧。 在安全領域有些...
圖書標籤: security 計算機科學 network 軟件工程 安全
Security的個方麵講的還挺清楚
評分Security的個方麵講的還挺清楚
評分模型分析非常到位!
評分模型分析非常到位!
評分模型分析非常到位!
Zero Trust Networks 2024 pdf epub mobi 電子書 下載