Securing the Future (Registro nro. 275569)

MARC details
000 -LIDER
fixed length control field 03705nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-031-63781-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250516160058.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240703s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031637810
-- 978-3-031-63781-0
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q342
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM004000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name H L, Gururaj.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Securing the Future
Medium [electronic resource] :
Remainder of title Introduction to Zero Trust in Cybersecurity /
Statement of responsibility, etc. by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 87 p. 17 illus., 16 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computational Intelligence,
International Standard Serial Number 2625-3712
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Foundations of Cybersecurity -- Chapter 2. Introduction to Zero Trust -- Chapter 3. Implementing Zero Trust Networks -- Chapter 4. Zero Trust for Cloud -- Chapter 5. Compliance and Governance in Zero Trust -- Chapter 6. Applications & Case Studies of Successful Zero Trust -- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security -- Chapter 8. Challenges and Future Scope.
520 ## - SUMMARY, ETC.
Summary, etc. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust implementations. Furthermore, it underscores the importance of cultivating Zero Trust awareness throughout organizational culture to fortify security measures effectively. Highlighting both the challenges and the future potential of Zero Trust, this book offers a roadmap for organizations seeking to bolster their cybersecurity defenses amidst an evolving threat landscape.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Owner UABC ;
Method of acquisition Perpetuidad
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computational intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data protection.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Término temático o nombre geográfico como elemento de entrada Data and Information Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name M, Spoorthi.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ravi, Vinayakumar.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name J, Shreyas.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Roy, Kumar Sekhar.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031637803
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031637827
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title SpringerBriefs in Computational Intelligence,
-- 2625-3712
856 40 - ELECTRONIC LOCATION AND ACCESS
Public note Libro electrónico
Uniform Resource Identifier http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-63781-0
912 ## -
-- ZDB-2-INR
912 ## -
-- ZDB-2-SXIT
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Date last seen Número de copia Tipo de material
  Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica 16/05/2025   16/05/2025 1 Libro Electrónico

Con tecnología Koha