Zero Trust Security, Adam Tilmar Jakobsen (9781394361090) — Readings Books

Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

We can't guarantee delivery by Christmas, but there's still time to get a great gift! Visit one of our shops or buy a digital gift card.

Zero Trust Security
Hardback

Zero Trust Security

$163.99
Sign in or become a Readings Member to add this title to your wishlist.

Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach

Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture.

Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.

Additional topics explored in Zero Trust Security include:

Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively Installation and use of Docker Compose and understanding of Docker Compose .yml files Elements of network segmentation including physical and logical segmentation and key technologies Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO)

Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO

Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.

Format
Hardback
Publisher
John Wiley & Sons Inc
Country
United States
Date
27 January 2026
Pages
224
ISBN
9781394361090

Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach

Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture.

Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.

Additional topics explored in Zero Trust Security include:

Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively Installation and use of Docker Compose and understanding of Docker Compose .yml files Elements of network segmentation including physical and logical segmentation and key technologies Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO)

Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field.

Read More
Format
Hardback
Publisher
John Wiley & Sons Inc
Country
United States
Date
27 January 2026
Pages
224
ISBN
9781394361090