Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This book delves into the complexities of business settings. It covers the practical guidelines and requirements your security team will need to design and execute a zero-trust journey while maximizing the value of your current enterprise security architecture. The goal of Zero Trust is to radically alter the underlying concept and approach to enterprise security, moving away from old and clearly unsuccessful perimeter-centric techniques and toward a dynamic, identity-centric, and policy-based approach.
This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them. It also covers Virtual Private Networks, types of VPNs.and also to understand how zero trust and VPN work together
By the completion of the book, you will be able to build a credible and defensible Zero Trust security architecture for your business, as well as implement a step-by-step process that will result in considerably better security and streamlined operations.
TABLE OF CONTENTS
Introduction to Enterprise Security
Get to Know Zero Trust
Architectures With Zero Trust
Zero Trust in Practice
Identity and Access Management (IAM)
Network Infrastructure
Network Access Control
Intrusion Detection and Prevention Systems
Virtual Private Networks
Next-Generation Firewalls
Security Operations
Privileged Access Management (PAM)
Data Protection
Infrastructure and Platform as a Service
15.Software as a Service (SaaS)
IoT Devices
A Policy of Zero Trust
Zero Trust Scenarios
Creating a Successful Zero Trust Environment
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This book delves into the complexities of business settings. It covers the practical guidelines and requirements your security team will need to design and execute a zero-trust journey while maximizing the value of your current enterprise security architecture. The goal of Zero Trust is to radically alter the underlying concept and approach to enterprise security, moving away from old and clearly unsuccessful perimeter-centric techniques and toward a dynamic, identity-centric, and policy-based approach.
This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them. It also covers Virtual Private Networks, types of VPNs.and also to understand how zero trust and VPN work together
By the completion of the book, you will be able to build a credible and defensible Zero Trust security architecture for your business, as well as implement a step-by-step process that will result in considerably better security and streamlined operations.
TABLE OF CONTENTS
Introduction to Enterprise Security
Get to Know Zero Trust
Architectures With Zero Trust
Zero Trust in Practice
Identity and Access Management (IAM)
Network Infrastructure
Network Access Control
Intrusion Detection and Prevention Systems
Virtual Private Networks
Next-Generation Firewalls
Security Operations
Privileged Access Management (PAM)
Data Protection
Infrastructure and Platform as a Service
15.Software as a Service (SaaS)
IoT Devices
A Policy of Zero Trust
Zero Trust Scenarios
Creating a Successful Zero Trust Environment