000 | 03705nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-031-63781-0 | ||
003 | DE-He213 | ||
005 | 20250516160058.0 | ||
007 | cr nn 008mamaa | ||
008 | 240703s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031637810 _9978-3-031-63781-0 |
||
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aH L, Gururaj. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSecuring the Future _h[electronic resource] : _bIntroduction to Zero Trust in Cybersecurity / _cby Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXV, 87 p. 17 illus., 16 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computational Intelligence, _x2625-3712 |
|
505 | 0 | _aChapter 1. Foundations of Cybersecurity -- Chapter 2. Introduction to Zero Trust -- Chapter 3. Implementing Zero Trust Networks -- Chapter 4. Zero Trust for Cloud -- Chapter 5. Compliance and Governance in Zero Trust -- Chapter 6. Applications & Case Studies of Successful Zero Trust -- Chapter 7. Zero Trust Awareness: Creating A Culture Aware of Security -- Chapter 8. Challenges and Future Scope. | |
520 | _aThis book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to practical insights on implementing Zero Trust networks and extending its principles to cloud environments. It addresses the crucial aspects of compliance and governance within the Zero Trust framework and provides real-world applications and case studies showcasing successful Zero Trust implementations. Furthermore, it underscores the importance of cultivating Zero Trust awareness throughout organizational culture to fortify security measures effectively. Highlighting both the challenges and the future potential of Zero Trust, this book offers a roadmap for organizations seeking to bolster their cybersecurity defenses amidst an evolving threat landscape. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aM, Spoorthi. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aRavi, Vinayakumar. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aJ, Shreyas. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
700 | 1 |
_aRoy, Kumar Sekhar. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031637803 |
776 | 0 | 8 |
_iPrinted edition: _z9783031637827 |
830 | 0 |
_aSpringerBriefs in Computational Intelligence, _x2625-3712 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-63781-0 |
912 | _aZDB-2-INR | ||
912 | _aZDB-2-SXIT | ||
942 | _cLIBRO_ELEC | ||
999 |
_c275569 _d275568 |