45,95 €
45,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
23 °P sammeln
45,95 €
45,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
23 °P sammeln
Als Download kaufen
45,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
23 °P sammeln
Jetzt verschenken
45,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
23 °P sammeln
  • Format: ePub

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:
Cloud | Networking | Identity management | Operational Technology (OT) | 5G
Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.
…mehr

Produktbeschreibung
The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies:

  • Cloud
  • Networking
  • Identity management
  • Operational Technology (OT)
  • 5G


Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Tom Madsen has 20+ years of experience in cybersecurity behind him, across many different industry segments, like finance, medical, and systems development in a secure manner. He is the author of many articles for a local Danish online magazine and is a regular writer for www.cybersecuritry-magazine.com. He has authored two other books: "The Art of War Fort Cyber Security", published by Springer, and "Security Architecture - How and Why", published by River Publishers.